December 23, 2015

2015: A Cloud Security Wake Up Call

Some interesting areas to watch include security information and event management (SIEM), which integrates security information management (SIM) and security event management (SEM). to provide real-time analysis of security alerts generated by network hardware and applications. Some SIEM leaders working on integrating SIEM with cloud security include Hytrust, IBM, Intel Security, and Splunk. An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. IDS leaders include Cisco (Sourcefire), IBM, Intel Security, and HP.


Innovation and the visionary CIO

Companies eyeing technology trends see massive opportunities and potential threats, with technology-led innovation as a competitive weapon that has two, very sharp, edges. This level of innovation doesn't arise from tactical decisions taken at the business unit level. It requires the kind of core assessment of technology, opportunity, and impact that only a centrally positioned role, such as the CIO, can deliver. While IT has long been responsible for "keeping the lights on," the best CIOs also look for ways to accelerate business growth, providing guidance and guard rails for the CEO and board. ... Keeping IT strategy headed in the right direction while avoiding investments in too many technological dead-ends requires a single vision of what is necessary and possible. Only the CIO can provide that vision.


Getting mobile device management right: Four key steps

One of the benefits of an MDM program is the ability to understand how employees are using their mobile devices. Routing the flow of information back to the IT department and help desk from the start can improve performance down the line. For example, an understanding of which devices and models are popular enables your help desk to train more accurately, resulting in better assistance with future troubleshooting issues. Another useful strategy is to share application inventory information with your support departments to ensure that corporate apps deploy properly. Sharing information with human resources about which users are active on which platforms helps their department appropriately update credential provisions when employees enter and leave the system.


Could the Internet of Things spark a data security epidemic?

What separates smart systems from "dumb" systems? IoT-enabled devices collect huge amounts of personal information, which can be retained and used to extrapolate users’ behavioral patterns and preferences. By doing so, businesses can then use these insights to automate and improve the overall user experience. This information is extremely valuable for businesses and consumers alike. However, it’s important to think about what happens to that data after you are done using the devices. In addition to acquisition and implementation, be sure to consider end-of-use or end-of-life scenarios too. In these cases, there needs to be a core feature and functionality in smart refrigerators, smart thermostats, smart TVs and all other connected products that fully wipes all data clean and can then show verifiable proof that no residual data could ever be recovered.


EU finally agrees draft of Europe-wide data privacy law

According to a recent European Parliament press release, however, the end may at last be in sight. The European Council and European Parliament have now reached a “strong compromise” on a draft of the GDPR. “It is now up to [EU] member states to give the green light to the agreement.” MEP Jan Philipp Albrecht, the European Parliament’s chief negotiator for the GDPR, said that “negotiations hopefully have cleared the way for a final agreement”. “In future,” he added, “firms breaching EU data protection rules could be fined as much as 4% of annual turnover – for global internet companies in particular, this could amount to billions. In addition, companies will also have to appoint a data protection officer if they process sensitive data on a large scale or collect information on many consumers”.


Poor security decisions expose payment terminals to mass fraud

Payment terminals require a secret key to authenticate with payment processors over the Poseidon protocol. However, like with ZVT, payment terminal manufacturers implemented the same authentication key across all of their terminals, SRLabs found. This error can be abused to steal money from merchant accounts. While most transactions add money to such accounts in exchange for goods or services, there are a few that can cost merchants money, for example transaction refunds or top-up vouchers like those used to recharge prepaid SIM cards. In the worst case scenario, attackers could hijack terminals and use them to issue refunds to bank accounts under their control from thousands of merchants by simply iterating through terminal IDs, which are usually assigned incrementally.


Amazon's 'Virtual CPU'? You Figure It Out

Amazon uses what it calls "EC2 Compute Units" or ECUs, as a measure of virtual CPU power. It defines one ECU as the equivalent of a 2007 Intel Xeon or AMD Opteron CPU running at 1 GHz to 1.2 GHz. That's a historical standard, since it dates back to the CPUs with which Amazon Web Services built its first infrastructure as a service in 2006 and 2007. (The Amazon ECU is also referred to as a 2006 Xeon running at 1.7 GHz. Amazon treats the two as equivalent.)  The value of Amazon's ECU approach is that it sets a value for what constitutes a CPU for a basic workload in the service. ECU's were not the simplest approach to describing a virtual CPU, but they at least had a definition attached to them. Operations managers and those responsible for calculating server pricing could use that measure for comparison shopping.


Cybersecurity in the digital age for the smart grid

Cybersecurity strategists must keep pace with – indeed, anticipate - the feverish pace of digital technology development. Each layer of the IP stack on which these technologies function offers hackers potential attack vectors into the emerging Smart Grid. Chip-laden computer boards integrated into a grid component – a transformer, a recloser, a circuit breaker – a represents a potential pathway into which hackers can gain entry to gather sensitive information or disrupt grid operations. Compliance with NERC and FERC regulations should be considered only a starting point toward true system security. In the ever-evolving digital age, regulations always lag behind rapid technology advancement and intensifying intruder strategies. Every power plant and interconnect now needs a brain trust which includes a lawyer, an insurance expert and a cybersecurity team.


Expect Data Breaches, Awareness to Increase in 2016

There is a lot of mystery wrapped up in security, given the sophisticated attacks launched by nation states and cyber criminals; however, many times the solution is simple and involves fundamental security principles like good passwords and encryption for sensitive data. Arguably every year should be the year of encryption, but we have seen enough avoidable damage from a lack of encryption (see TalkTalk shares tank 11% on fears that customer compensation bill could wipe out profits and “I am surprised….no encryption has been used”) this year that those responsible will start to insist upon encryption being a fundamental part of the overall storage/security strategy. The end of US/EU Safe Harbor will also help push encryption as part of a data privacy mechanism.


Updated Mobile Malware Targets Android

"Mobile devices are the new front for cybercrime - the earlier a bank acts, the sooner criminals find other targets," says Al Pascual, director of fraud and security at Javelin Strategy & Research. "To manage this growing threat, bankers should apply a holistic approach, including account-holder education on mobile security best practices, biometric authentication in the mobile app, and strong back-end account security, such as behavior metrics, device fingerprinting and transaction analysis." But banks' efforts are being subverted in part by many Android device manufacturers failing to keep their customers' devices updated with the latest operating system updates and security patches. According to research conducted by G Data in October, for example, few Android devices today are secure.



Quote for the day:



"Opportunity always involves some risk. You can?t steal second base & keep your foot on first!" -- Joseph Heller


December 22, 2015

Agile is not Enough: Revolution Over Transformation

Todd Charron has been a speaker at numerous conferences, is the lead mentor for Lean Startup Machine Toronto and is the founder of Follow Your Fear Day. Todd combines his background in Improv with over 15 years of experience in the software industry as a Developer, Manager, Agile Coach, and Lean Startup Mentor to help organizations and teams be bolder and more creative. ... Todd Charron argues that for success it is necessary to go beyond a change of processes and tools, to change how people in an organization see themselves and their role in it.


The road to hybrid cloud architecture is paved with mistakes

One error organizations used to make when implementing hybrid cloud architecture, said David Linthicum, a consultant at Cloud Technology Partners Inc. and author of numerous books on IT, started with OpenStack. IT organizations use the open source cloud software platform to build a private cloud, which offers advantages similar to public cloud but uses in-house architecture. It's a perfectly reasonable endeavor, except many organizations didn't fully understand what they're getting into. "It was too much of an engineering challenge for them to take on, and they ended up going over budget or just abandoning it quickly," Linthicum said. The problem for many was that they believed the hype on private cloud as a bulletproof and easy-to-implement alternative to public cloud, Linthicum said, citing 2013 as the banner year for vendor bunk.


Year-end career checkup, Part 1: If you listen, they will call

We've all seen plenty of comedy -- or tragedy -- result when two people who don't speak the same language attempt to converse. Even when they do, misinterpretations and misperceptions abound, and our workplaces prove it. Job interviews and talks with recruiters are even more susceptible to these roadblocks, since they occur between people who probably don't know each other and don't have similar pasts (professional or personal), and when one party (you) is in the especially tense situation of seeking new employment. A review of best practices in recruiting and interviewing reveals that listening, defined as a means to this end, has finally earned a spot in the curriculum on how to ace this critical skill. Start by being careful. Instruction on listening typically centers on the ability to reflect feeling or paraphrase feedback.


The web is 25. What will it be like when it's 50?

Thanks to broadband, web browsers, and the cloud, we now do everything over the Internet. With Chromebooks, Google has shown us that we don't need local programs at all. It's not just Google, a company born of the Web. Microsoft, which made its billions from the standalone PC, is now moving its fortunes to cloud-based applications such as Office 365. Today, our friends and office mates are scattered around the globe, but they're only a keystroke away on social networks, VoIP, or videoconferencing. Unless you're working at Yahoo, you can pretty much work anywhere in the world. Thanks to the rise of smartphones and tablets, we're no longer even tied to desktops or laptops. So long as you have power and Wi-Fi, there's nowhere you can't work or play. And, it all goes back to the Web.


Why It's Time To Say Goodbye To IT

Of course, something needs to take its place. But instead of the customer-hostile, Mordac-the-Preventer-of-IT-Services, consider the "us means all of us, not just IT" model of digital services. Digital services will necessarily be a huge change. We'll need our organization's best technologists. We'll need great communicators, awesome project managers, fantastic marketing pros, skilled negotiators, and the cream of our data scientists. Sure, we'll need security and infrastructure folks, but a lot fewer of them (read: the collaborative, friendly ones), because we'll standardize and be using lots of pay-as-you-go cloud services for maximum flexibility. We can't have control freaks. No sociopaths are allowed who think that technology is only for technologists.


World Quality Report 2015-2016

The speed of digital transformation and short life-cycles of device and services is increasing the importance and pressure on quality assurance testing. Additional conclusions highlights that a seamless customer experience is a key driver for QA testing, the shorter lifecycles demand greater agility and new roles are being created to meet testing demand. ... Key recommendations from this year’s report: Refocus QA and Testing on customer experience and business assurance; Transform the traditional Test Center of Excellence (TCOE) using agile and DevOps practices; Make continuous and automated security testing a key strategy; Prioritize testing with predictive analytics and continuous feedback; and Expand testing teams’ skills beyond manual and test automation.


The hidden pitfalls of Internet of Things development

One of the first problems confronting any IoT developer is the industry's distinct lack of standards. In a report, McKinsey & Co. notes that "Interoperability between IoT systems is critical," but goes on to lament the mishmash of conflicting "standards" that plague IoT's market potential. As I've suggested, though vendors dominate the more than 400 competing standards, the battle for developer hearts is more likely going to be won by de facto open source standards. Even so, the problems with IoT development don't end there. More unfortunate still, IoT development can appear deceptively simple, as Cohen stresses:


International data centers face Safe Harbor loss

Safe Harbor's failure will have a minimal effect at the high level. The groups responsible for dealing with organizations that do not follow data security and management procedures are the same ones that can't reach agreement on a new Safe Harbor. Organizations compliant to the requirements of the old Safe Harbor are unlikely to be taken to court, as the countries that drew up the EU Directive 95/46/EC on the protection of personal data agreed that Safe Harbor was compatible with the directive. If an international data protection trial does arise, pointing out that your organization is compliant with current laws in place should be a clincher.


On Big Data Analytics. Interview with Shilpa Lawande

Before we talk about technical challenges, I would like to point out the difference between two classes of analytic workloads that often get grouped under “streaming” or “real-time analytics”. The first and perhaps more challenging workload deals with analytics at large scale on stored data but where new data may be coming in very fast, in micro-batches. In this workload, challenges are twofold – the first challenge is about reducing the latency between ingest and analysis, in other words, ensuring that data can be made available for analysis soon after it arrives, and the second challenge is about offering rich, fast analytics on the entire data set, not just the latest batch.


Can Collaborative Security Work?

“The biggest and most universal problem [with information sharing] is that trust tends to happen between individuals, and not between organizations,” says Wendy Nather, R-CISC research director. “When we talk to people, we find that they already have information sharing going on – it’s just with individuals that they trust. Getting them to shift that trust to an organizational relationship and keeping that going when the original person moves on (which happens a lot in security) is the biggest challenge.” R-CISC already has about 50 corporate members, and some of them come from outside the retail industry, Nather says. Oil and gas companies have joined the retail group, for instance, because most gas stations also operate convenience stores.



Quote for the day:


"A culture of discipline is not a principle of business; it is a principle of greatness." -- Jim Collins


December 21, 2015

Why we need a national IoT strategy

While the Center for Data Innovation report anticipates that the private sector will be the primary driver of innovation and development in the IoT over time, it notes that there is hesitation among many firms to dive headlong into the field owing to concerns over the risks of not being able to recoup investment in the nascent technology. In that regard, the center is suggesting that the government could position itself as an early adopter, deploying IoT devices and applications in its own facilities and in the sectors where it plays a dominant role, such as defense, transportation and energy. Castro also sees a role for the government to play in expanding deployment of the infrastructure that supports IoT -- and ensuring universal access to it -- to prevent a new type of digital divide from taking hold.


A practical guide to effectively ushering DevOps into any organization

Many times, we observe that within the IT organization, development, testing, and operations have different goals, objectives, and KPI’s. They never cross-functionally define business needs. They mostly define technology as organization-specific. As an example, a functional tester doesn’t know how developers are communicating with each other, or the security team for security-related issues. An operations engineer has KPI up-time, but he really doesn’t know the various application modules he's supporting.  Suddenly, by enforcing DevOps, we're telling all the organization to begin communicating, start intersecting, start having cross-communication. So this has become a key problem in the 21st century infrastructure, application, testing, or overall DevOps framework implementation. Communication and understanding have become key challenges for organizations.


Cloud Foundry Launches Cross-Vendor Cloud Service Certification

"We are betting big on Cloud Foundry to run our next-generation Nexen digital ecosystem. We need to be able to run our apps all over the world, and that means we need Certified Cloud Foundry to guarantee portability," Kumar said in Cloud Foundry's announcement Dec. 15. Cloud Foundry also has a reputation for providing good virtual machine and container tools geared to modern microservice applications. It automatically embraced VMware and open source hypervisors. Its Garden and Warden container technologies were designed to deal with different container formats and runtimes, moving it beyond the just-Docker approach prevalent in the early days of containers. Another user commenting in Cloud Foundry's announcement was Kaiser Permanente's CTO Mike Sutten.


Benefits of an “Agile” Mindset

The main difference in rapid project initiation lies in the level of detail explored. Because the agile approach is designed to be tolerant of change, the lean principles of “just enough” and “just in time” are applied to project planning. Agile projects draw the “just enough” line at a relatively high level, leaving significant ambiguity at this phase of the project. This ambiguity is most obvious in the lack of requirements detail and the rough preliminary project plan produced. A Guide to the Project Management Body of Knowledge (PMBOK® Guide) Fifth Edition, Project Management Institute, Inc., 2013, does not specify the level of detail needed for project initiation.


Essential data points for the tech year ahead

If an overarching conclusion can be drawn from the results of Computerworld's Forecast survey of 182 IT professionals, it's that 2016 is shaping up to be the year of IT as a change agent. IT is poised to move fully to the center of the business in 2016, as digital transformation becomes a top strategic priority. CIOs and their tech organizations are well positioned to drive that change, thanks to IT budget growth, head count increases and a pronounced shift toward strategic spending. Amid the breakneck pace of change in technology and business alike, where should you direct your focus in the new year? Read on for key highlights and data points on budgeting, hiring, business priorities and disruptive technologies that promise to define the IT landscape in 2016.


JUnit Lambda: The Prototype

The most important piece of JUnit’s API is the @Test annotation and nothing changes here: Only the methods annotated with it will be considered as tests. The tried and tested annotations to set up and tear down tests stay virtually unchanged but have new names: @Before and @After, which run before and after each test method, are now called @BeforeEach and @AfterEach; and @BeforeClass and @AfterClass, which run before the first and after the last test from a class, are now called @BeforeAll and @AfterAll. I like the new names. They are more intention revealing and thus easier to understand – especially for beginners. Then there is the new @Name, which can be used to give more human readable names to test classes and methods.


Four technologies impacting enterprise communication

Messaging through smartphone applications is an obvious means of communication considering we are always connected. We used to walk away from our phones, but now we still have them even if we are busy. Enterprise UC services offer instant messaging, but it is not usually effective for inter-company work teams. A new breed of business-focused messaging apps, such as Slack and HipChat, are gaining popularity, but they don't do a great job at real-time communications. Workstream communications and collaboration (WCC) is where asynchronous messaging-based solutions combine with UC. Services are already available from several vendors including Cisco, Interactive Intelligence and Unify, and many more are coming.


5 Strategic Planning Pitfalls and their Antidotes

People often enter a planning process with the expressed concern that “this will not be actionable and we will fail to actually implement it back at work.” As a result, an inordinate amount of time goes into attempting to plan for how to implement the plan back at work. Predictably, back at work, the day-to-day whirlwind of business as usual takes those well made plans and has their way with them, leaving people feeling frustrated at the time spent preparing for execution. ... Planning at its best results in new context, prioritization, and vision that allows day-to-day work to be executed in sync with the directional push, not separate and distinct from it. Over-communicate the plans and priorities you craft in strategic planning sessions so that everyone, at every level, understands how what they do today connects to where you are going tomorrow.


“DevOps: A Software Architect's Perspective”

Activities that have system-wide impact should occur within the constraints of the enterprise. There are two types of monitoring and metrics that are relevant to a team. One is the monitoring and metrics of their particular code (service, subsystem, whatever). The team needs to have leeway to do the right thing in this case. The other type of monitoring and metrics are those with business relevance - transactions per second, latency, reliability, orders per second, etc. Monitoring needs to present both the business relevant metrics and have the ability to drill down to determine which code segments are contributing what to those metrics. Developers when they deploy a new version should first ensure that the business metrics are not affected (or are affected in predicted ways) and then that their particular new deployment is behaving well.


Welcome To The ‘Always-On’ IT Department

To be effective, and considerate, the IT department should have no more than four to six layers for the user to navigate through. Fewer than four and the user’s problem really can’t be identified with enough certainty. More than six, and the user is probably going to get very perturbed.  “The first thing is programming [the on-call scheduling system] as explicitly as possible,” Jones says. “We know people don’t want to sit through 10 different choices, but the more choices you have, the more likely you are to get somebody to the right place. Still, there’s a limit to the number of buttons on a phone – and usually we don’t want 10 choices – you can’t use a zero because that will call an operator, theoretically. This is the dilemma, because to be explicit and to be quick and to the point, and also be easy to program are often totally at odds with each other.”



Quote for the day:


"When you believe you have lost your power and control, nothing will ever seem easy or simple." -- Shannon Alder


December 20, 2015

Mobile App Developers are Suffering

First, a user must discover the potential new app. This is by far the most challenging problem that developers face. There are two portals for discovery today: 1. paid promotion, which is dominated by Facebook, and 2. the app stores themselves. The biggest issue is that these two forms of promotion only work for the apps that have already been discovered. Paid promotion is completely unsustainable for most apps given that the cost for an active install increased to $4.14 in the last few months. I can count on my hands the number of business models in the app ecosystem which can support that cost of customer acquisition. This means that app ads are only usable by the very small percentage of the ecosystem that is monetizing well. For the majority, it is a prohibitive channel.


Driving Digital Transformation Using Enterprise Architecture

The speciality here is, change in pattern for “Transformation” when the prefix “Digital” gets associated. It is no longer IT for Business. It is technology-enabled business, literally! The basics of market place of how one get their 4Ps together to generate values is changing and thus newer Business Model. That is where the critical differentiation comes in. This drives in a couple of thoughts: A) Business Gurus need to understand information and technology B) Technical Gurus need to understand business. It is no longer a question of business and IT alignment, it is a question of merger and how the mix looks like! Everyone understands this and understands that change is unavoidable. However, they are also apprehensive of repeating “past failures to transform”.


Google reveals the most popular searches in 2015

Google has released its list of the most searched terms of 2015. Over 3.5 billion searches are made on Google everyday - around 1.2 trillion per year - and the company combs through these to compile a list of the most popular. The list is a good way to measure what happened during the year and includes a mix of news events, films, celebrities, and apps. Here are the top 10 most popular searches on Google in the past year.


In Who Do We Trust? How Privilege Plays Out in Security and Privacy Online

To make matters worse, there are often conflicting reports on how consumers should protect themselves from identity theft, surveillance and other online threats. Without trusted beacons out there, it is often up to individuals to figure out how to protect themselves — or recover — from invasions when they do occur. Threatening the situation even further is the acceleration of cybersecurity misinformation and government manipulation in the wake of the November 13th Paris attacks. As information about the Daesh (aka ISIS)-affiliated perpetrators began to emerge, so did reports on how they planned their attacks.


The First Person to Hack the iPhone Built a Self-Driving Car. In His Garage

There are two breakthroughs that make Hotz’s system possible. The first comes from the rise in computing power since the days of the Grand Challenge. He uses graphics chips that normally power video game consoles to process images pulled in by the car’s camera and speedy Intel chips to run his AI calculations. Where the Grand Challenge teams spent millions on their hardware and sensors, Hotz, using his winnings from hacking contests, spent a total of $50,000—the bulk of which ($30,000) was for the car itself. The second advance is deep learning, an AI technology that has taken off over the past few years. It allows researchers to assign a task to computers and then sit back as the machines in essence teach themselves how to accomplish and finally master the job. In the past


Tech support call scams becoming more aggressive

Another variation of the tech support scam is luring people to the bogus, malicious fake site. The US Federal Trade Commission (FTC) recently fined ($1.3 million) and shut down some scammers who had stolen over $17 million from their duped victims by luring them to their sites with pop-up alerts telling the victim that malware was on their PC. The ads provided a contact number and people would be told to call to get rid of the problem. From there they’d be directed to a malicious site and the unsuspecting victim would follow instructions, and then nasty malware, ransomware would be downloaded, and they would be charged thousands of dollars to have it removed. Every business, of every size, and every individual is a potential target. Make sure that everyone in the organization can recognize some of the key red flags of a tech support scammer.


Using MySQL with Entity Framework

Starting with version 6.7, Connector/Net will no longer include the MySQL for Visual Studio integration. That functionality is now available in a separate product called MySQL for Visual Studio available using the MySQL Installer for Windows ... They have created an *open system for others to plug-in ‘providers’ – postgres and sqlite have it – mysql is just laggin… but, good news for those interested, i too was looking for this and found that the MySql Connector/Net 6.0 will have it… You would need a mapping provider for MySQL. That is an extra thing the Entity Framework needs to make the magic happen. This blog talks about other mapping providers besides the one Microsoft is supplying. I haven’t found any mentionings of MySQL.


Peer Feedback Loops: How to Contribute to a Culture of Continuous Improvement

Feedback is an essential part of any lean or agile development. This holds for the technical level as well as for your work management system. This article advocates for complementing the well-known strategies of metrics and meetings with peer feedback. Why peer feedback? Simply speaking, because this kind of feedback encourages continuous improvement on a personal level too. ... the value-add of peer feedback depends heavily on how it is facilitated. That is why, the three articles of the series present a total of nine methods I've tried and tested in various environments. To make these methods as comprehensive as possible they are presented in the context of real-life case studies and complemented by some figures to illustrate what they can look like.


Web Socket Server in C#

A lot of the Web Socket examples out there are for old Web Socket versions and included complicated code (and external libraries) for fall back communication. All modern browsers that anyone cares about (including safari on an iphone) support at least version 13 of the Web Socket protocol so I'd rather not complicate things. This is a bare bones implementation of the web socket protocol in C# with no external libraries involved. You can connect using standard HTML5 JavaScript. This application serves up basic html pages as well as handling WebSocket connections. This may seem confusing but it allows you to send the client the html they need to make a web socket connection and also allows you to share the same port.


When And Why OpenStack Needs A Cloud Management Platform

Different companies stop at different stages of this maturity model, depending on the business needs and the maturity of their IT organization. As the environments in stage 1 and stage 2 grow in size and complexity, companies can reach an operational scale that requires more sophisticated management tools than the ones provided out of the box by server virtualization and IaaS cloud engines. ... OpenStack does a great job in providing the instrumentation for the aforementioned capabilities – think the metering APIs that OpenStack Telemetry (Ceilometer) offers or the orchestration templates that you can define with OpenStack Orchestration



Quote for the day:


"Before you are a leader, success is all about growing yourself. When you become a leader, success is all about growing others." -- Jack Welch


December 19, 2015

Next Breakthrough Wearable Doesn’t Need More Functionalities, It Needs Versatility

Garmin’s Vivofit line drives home this point. Popping the display out of the band makes you realise what’s at the heart of these products when stripped of their bands. It’s like that scene in Return of the Jedi when you realise that, beneath all of that cool black armour, Darth Vader is really just an elderly bald man playing the harmonica. Paired with the dozens of different bands the company offers, the Vivofit can become a completely different thing entirely. Misfit’s Shine takes this idea to a compelling extreme. It’s a device that’s essentially a little metal pebble that slots into various different wearable form factors, including a wristband, a necklace and a simple clip.


2016 - The Year of Connected Customer

Although most companies recognize the importance of customer relationships, they lack the necessary skills, processes and technology to utilize data to their advantage. Most businesses are drowning in customer and employee data, yet they're unable to quench their thirst for actionable insights that deliver customer value and successful business outcomes. IDC research shows that less than one percent of customer data is analyzed by businesses today. The inability to analyze customer data results in 77% of customer who are not engaged with companies that they do business with. Companies cannot afford to ignore the connected customer.


Why Elon Musk Is Nervous About Artificial Intelligence

Thiel has called Altman and Musk's fears "a little bit overdone at this point," but for years has admitted that the outcome of artificial intelligence research could be a mixed bag. An artificially intelligent computer "could be very good, it could be very bad, it could be somewhere in between," he told Business Insider in 2009. "Certainly we would hope that it would be friendly to human beings." Regardless of how friendly AI might be, Thiel says that with the technology developing, it might be best not to come off as an anti-computer human being, lest future synthetic entities turn out to be the type to hold a grudge.


Stress management can reduce absenteeism

Luthans’ research clearly demonstrates that boosting psychological capital in a company equates to improved productivity. In a paper titled “Positive psychological capital: Beyond human and social capital,” he states that “the value created when human capital is aligned with corporate strategy and fully engaged in making the enterprise effective has been researched extensively…and found to have a significant positive impact on performance outcomes.” As companies face tougher competition for both human capital and improved financial results, they would benefit by investing in programs that foster a resilient workforce. As the ever-changing workplace requires people to learn new skills and adapt to changing management styles, the importance of stress management is evident. But it’s how a person responds to these situations that magnifies his or her level of resiliency.


What Big Data Analytics Can Learn From The NoSQL World

The first lesson Big Data can learn from the NoSQL world (and from other modern software domains like mobile, social and more) is that simplicity and ease-of use are key – they are not nice-to-haves and do not take a back seat to anything else. Developers are viewed by the NoSQL world as the “masters” – and the technology needs to fit the way these masters will use it. Perhaps the main reason that NoSQL has been so successful is its appeal to developers who find it easy to use and who feel they are an order of magnitude more productive than other environments. The same is true for ops. The result is something that makes everyone more productive – developers, ops people etc.


Why a Solid IT Infrastructure is Important in Establishing Business Continuity

Ensuring business continuity in a connected environment will require high availability. This refers to the operational duration of any system. A 100% uptime means your infrastructure never experiences any unexpected outage. As this is virtually impossible, reputable service providers aim for at least 99.999% uptime, which translates to only five minutes of downtime in any given year. From the perspective of a connected business, this approach ensures the optimized performance of a website or enterprise platform. It detects points of failure that can potentially cause the downtime and mitigates failure by distributing the load and traffic across the infrastructure. In the event of failure, a high availability infrastructure will have failover and recovery mechanisms.


Yesterday’s technologies, today’s problems

What those really old systems will do, however, is fail. I don’t know about you, but I sure wouldn’t want to try to restore data from a Windows 2000 system, never mind a VAX/VMS box, an AT&T 3B2 System V Release 3.2 Unix system, or a TRS Color Computer (endearingly known as CoCo). I didn’t pick these computers at random. I know people who are using all of them for production. I can also guarantee that if you’re using a “modern” but out-of-date copy of Mac OS X, Linux or Windows, you will be attacked and hacked. If your system is on the Internet, it’s only a matter of days before your systems will be cracked. Worse still are those embedded devices, such as Wi-Fi access points, that never get their firmware updated. Many of these contain cracked software, such as OpenSSL with the Heartbleed vulnerability.


Understanding the Cyber Dialogue

Cybersecurity is more than a technological issue—it’s a business issue. In a BoardVision video moderated by Judy Warner—editor-in-chief of NACD Directorshipmagazine—Mary Ann Cloyd, leader of PwC’s Center for Board Governance, and Zan M. Vautrinot, former commander of the Air Forces Cyber Command and current director of Symantec, Ecolab, and Parsons Corp., discuss effective cyber-risk oversight, addressing the following questions: How can boards communicate with management about cyber risk? How does cyber risk fit into discussions about risk appetite?


The Soul of a New Release: Eating Our Own Dog Food

The second pillar of a successful release was made possible by what we call the “meta-solution” situation, an Alice in Wonderland kind of paradox that occurs when you build monitoring solutions that you can use to monitor your own services. To give you an idea how this was beneficial to us, let me describe the solution we were building in a few words. Plumbr is designed to detect slow and failing user transactions in an application, and automatically link such transactions to the root cause in the source code. Building such a solution meant that the task of testing and especially performance testing new code was reduced to processing the alerts triggered by Plumbr (the instance that was monitoring Plumbr) and fixing the exposed root causes as they appeared during the development process.


Everything You Know About Latency Is Wrong

Almost all latency benchmarks are broken because almost all benchmarking tools are broken. The number one cause of problems in benchmarks is something called “coordinated omission,” which Gil refers to as “a conspiracy we’re all a part of” because it’s everywhere. Almost all load generators have this problem. We can look at a common load-testing example to see how this problem manifests. With this type of test, a client generally issues requests at a certain rate, measures the response time for each request, and puts them in buckets from which we can study percentiles later. The problem is what if the thing being measured took longer than the time it would have taken before sending the next thing? What if you’re sending something every second, but this particular thing took 1.5 seconds?



Quote for the day:


"Boring is an attitude, not the truth. Possibility is where you decide it is." -- Seth Godin


December 18, 2015

#noprojects – Focus on Value, Not Projects

#noprojects provides a better and less risky approach to delivery by removing the common factor in all of these failures, the project itself. This is not to say that there are no failures in a #noprojects approach. However, because of the discrete nature of #noprojects activities, technical failure is self-contained, easily identified and generally recoverable. Failure relating to project process, project governance, stakeholder buy-in, and scope management is, by definition, no longer relevant. Opportunity costs can be the hardest to quantify, but can be the largest single cost to an organisation running a project.


How to avoid being caught out by ransomware

Patrick Wheeler, director of product at Proofpoint, calls regular backups “the most reliable method for recovering infected systems”, which makes it all the more important to prevent the initial infection. Gary Warner, chief threat scientist at PhishMe, says that rather than a simple backup, in order to be effective, a backup must be “serialised”, with older versions of files available in case newer versions have been corrupted or encrypted.Other advice includes storing backups in an offline environment because many ransomware variants will try to encrypt data on connected network shares and removable drives. Daniel Miessler, director of client advisory services at IOActive, stresses the importance of having known-good and up-to-date backups that are as close to real time as possible.


Can This Man Make AI More Human?

Given that probabilistic algorithms and other technology in the works at Geometric Intelligence would be compatible with deep learning, it is possible that eventually the likes of Google or Facebook will acquire the company and add it to its overall AI portfolio. And despite Marcus’s criticism of connectionism and deep-learning fever, I have a hunch that he would be quite satisfied with such an outcome. Even if that does happen, it will be significant if ­Marcus can show that the most miraculous learning system we know—the human mind—is key to the future of artificial intelligence. Marcus gives me another example of his son’s cleverness. “My wife asked him, ‘Which of your animal friends will come to school today?’”


Public cloud vs. on-premises, which is more secure?

Perhaps cloud pessimists have good reason. In 2014 CodeSpaces became a poster-child example of how not to use the cloud correctly. Hackers gained access into the company’s central AWS administrative and demanded a ransom. When it was not paid hackers deleted everything in CodeSpaces’ AWS environment. It was a dark day for cloud security. Some saw it as an example of why the cloud can be insecure. Others used it as a teaching moment. But there are certain workloads that will likely never move to a public cloud. Some organizations for regulatory, compliance, safety or customer demand reasons require “air-gap,” offline data center operations – meaning no network connectivity into or out of the data center.


Big Data – The Trillion Dollar Asset

If you look at companies today, most of them are not very good at using the data they have to make better decisions in real time. I think this is where the next trillion dollars comes from for our customers and for our industry.” Dell’s in the midst of a $67 billion, history-making tech acquisition with EMC and clearly trusts the enterprise information technology as a service (ITaaS) leader to store and manage a treasure chest of smart data. And Dell isn’t the only tech player betting on a hot data economy. ... And by 2020 IDC believes that line of business buyers will help drive analytics beyond its historical sweet spot of relational (performance management) to the double-digit growth rates of real-time intelligence and exploration/discovery of the unstructured worlds.


The Inception Of Wearables In The Workforce

The information organisations will be able to gather with wearables can improve productivity, increase employee engagement and even potentially lower the number of sick days employees take. The use of this data presents the opportunity to largely disrupt existing benefits and rewards schemes. While wearables allow employees to go hands-free and participate in meetings while on the go, the real value for organisations will be real-time insights and the information these devices can collect. For instance, wearables can allow employers to easily track an employee’s time throughout the day and gain a clear picture on where time is being spent and quickly identify inefficiencies. This information can have an enormous impact on a company’s ROI and show new ways to improve employee engagement based on individuals’ preferences and habits.


Now's the time to perform a personal Android security audit

Head over to the Google Play Store settings and look at your list of available devices. These are the Android devices that show up as options every time you install a new app from the Play Store Web interface -- and also the devices that show up as options in the Android Device Manager (more on that in a sec). ... You might not realize it, but Google has its own utility for tracking, finding, and remotely wiping an Android device in case you ever lose it -- and the whole system is built right into the operating system. So what are you waiting for? Make sure all of your phones and tablets are enrolled now, before it's too late. Just head into the Google section of each device's main settings menu (or look for the app called Google Settings), then tap Security and verify that "Remotely locate this device" and "Allow remote lock and erase" are both checked.


Lessons Learned About Cloud Migration

An interesting side effect of cloud migration is that it placed APM tools on the agenda of the CIO. With the elasticity and flexibility of the cloud, companies can more directly and immediately drive cost optimizations. Greg Birdwell from BARBRI made the point, “We use an APM tool not only to monitor the health of our infrastructure. If I see that we have servers consuming significantly less CPU or memory, I can switch to cheaper instances. The cost savings are immediate.” Mark Kaplan of BARBRI said that Ruxit helped them to get exactly the insight into the dependencies and resource requirements of their environemt as basis for migration It might still take a while until we see CIOs around the world looking at APM tools and calculating cost benefits based on monitoring data, but things are moving that direction.


Biometrics to support 50pc of mobile transactions in 2016: report

There was also was significant growth in 2015 in the number of people using their mobile devices to open a wide range of financial accounts. With this trend in mind, financial institutions are increasingly optimizing their account opening content for the mobile Web and integrating it into their apps. Others who are lagging behind are expected to put this at the top of their priority lists in 2016, per Mitek. With certain clients already seeing a greater volume of account openings on mobile compared to desktop and other expected to put a focus on this next year, Mitek forecasts that mobile will win the account opening race in 2016.


Work-life balance: don't overlook the role of technology

Often management make assumptions that employees are armed with the right equipment or that the tools are "good enough" to work with, so are reluctant to rock the boat to invest in new technology. PwC saw that a UC deployment achieved a whopping 54% uplift in employee well-being. That clearly highlights that employee's value being given technology that make their jobs and collaboration easier.  For me the big worry was the marked difference between the 8% well-being benefit that management expected and the realised 54%. This shows how out-of-touch management really are with how employees feel about their jobs and their desire to perform to the best of their ability.



Quote for the day:


"The final test of a leader is that he leaves behind him in other men the conviction and the will to carry on." -- Walter Lippmann


December 17, 2015

Cisco Spark – is this the New Collaboration Era?

Kudos to Cisco for taking a bottom-up approach to redefine the solution around a problem set that decision-makers can understand. Nobody has really cracked the code yet, but based on what we saw last week, I think Cisco has come the closest so far. Rowan rightly noted that two key UC building blocks – telephony and video – were designed pre-mobility and pre-Internet, and that just won’t cut it for today’s collaboration needs. So, they’ve re-designed these as part of Spark Service for the cloud and from the cloud, and when you start like this from a clean slate you’re already ahead of the pack. As to whether we really are in a new era, we’ll find out next year, but I’ll start with three distinct things Cisco has done to change the game.


9 ways corporate fitness and wellness programs will change in 2016

The trend of incorporating "mental well-being" into corporate health programs is gaining traction in places such as Silicon Valley, according to Nichol Bradford, founder of the Transformative Technology Lab in Palo Alto, Calif. Some tech companies are "looking into ways to incorporate wearable gear that measures brainwaves, as well as meditation programs that help employees better communicate and become leaders," he says. ... Many modern corporate fitness and wellness programs already employ activity trackers, but 2016 will bring additional technologies and applications into the mix. We can expect to see a more "multifaceted" approach to delivering new features, according to Jeff Ruby, Newtopia founder and CEO, including live fitness coaching delivered to employees via two-way video conferencing.


The Connected Person’: IoT, Big Data, and the Cloud

In the relatively near future, a standards- and cloud-enabled IoT for service providers will likely also serve “the connected person.” This is already happening to some degree via apps on mobile devices. The personalized cloud for individuals will be populated by devices, software and data that ultimately bring the world to one’s digital doorstep. This will provide a means to access, monitor and to some extent control one’s digital world, from the home area network to the larger world. Cloud-enabled IoT and associated Big Data processing has implications for healthcare, education, transportation, personal finance – all the industry verticals served today by the Internet. In this vision, cloud-based hardware in conjunction with cloud-based software will capture, share, route, process and visualize information.


Refactoring Code to Load a Document

Much modern web server code talks to upstream services which return JSON data, do a little munging of that JSON data, and send it over to rich client web pages using fashionable single page application frameworks. Talking to people working with such systems I hear a fair bit of frustration of how much work they need to do to manipulate these JSON documents. Much of this frustration could be avoided by encapsulating a combination of loading strategies. ... Specifying just the bits I need via databinding is a really good way to get hold of a reduced set of data like this. Libraries that use databinding like this usually have a configuration parameter that indicates how the databinding should treat fields in the JSON that don't have a binding in the target records.


Hidden colocation cost drivers that add up

When it comes to colocation deals, there is absolutely no substitute for due diligence. Consider the value-added services and support level that are most appropriate for the business, as well as what happens when you need more. Are there cost penalties, for example, or will excess support requests simply go unanswered? Read the contract, service-level agreement (SLA) and any price lists or addendums carefully. Ask the provider directly about any costs or fees that weren't covered, such as early termination. When you select a colocation provider, don't be afraid to start small and expand services later, and don't hesitate to negotiate for the most cost-effective services. You can often negotiate services and support costs, and competitive providers want to talk when a long-term contract is on the line.


5 Ways ADCs Can Improve Performance of Network Infrastructure

Optimizing network performance is a task that spans multiple domains – from architecting the network, with capacity and topology (segmentation) considerations, through redundancy, bandwidth management and security aspects. But today, I would like to raise 5 additional ways to optimize overall network performance by best utilizing advanced Application Delivery Controller (ADC) capabilities for front end applications. ... A lot has been said about the 30 year old Transmission Control Protocol (TCP) and how it was designed for reliability. This impacts efficiency and performance and on top of that challenge, there’s also the chatty nature of the HTTP protocol to consider.


The 10 most important lessons IT learned in 2015

The end of a year is always a good time for reflection, especially so if you're evaluating what your business did right and what you can improve upon. In an increasingly digital world, IT has quickly become one of, if not the most, important aspects of an organization. So, it should be with great care that executives and admins look back on their year and try to glean some wisdom about what can be done differently in the year to come. ... "BYOX is the new mantra with consumers bringing their own applications, cloud sharing tools, social media into the enterprise; essentially bringing their own expectations of which technology they want to use and how and where they want to work in a corporate environment," said Chuck Pol, president of Vodafone Americas.


“Outsourcing Is Bad:” Why Good Vendors Agree

For both obviously tech driven and less obviously tech driven companies, success hinges upon strategic software development that meets business goals. IT is now more than ever in the driver’s seat—or has the chance to be. That means ensuring “t’s are crossed and i’s are dotted.” You can’t do that unless your internal software development folks are strong, and your external software development resources are integrated with them in a meaningful way. I refer to this latter integration as “team augmentation”—not to be confused with staff augmentation. Team aug requires any third party team members to be grown up and into, embrace and support today’s business and IT culture of rapid development, big picture thinking, knowledge sharing, ownership, and quality.


It's Time For IT Teams to Digitize Like The Startups Do

Unlike a manufacturing plant, a knowledge work factory has no industrial engineers who recognize errors as valuable redesign opportunities. Instead, each employee in the knowledge work factory is expected to manage a dizzying array of one-off corrections. If they think of these corrections at all, they and their managers view these as valuable activity. After all, they are preserving revenue, making the sales force more effective and keeping customers happy. This is virtuous activity – “virtuous waste.”  Despite its circular logic, the virtuous waste misperception provides an opportunity for knowledge workers to continue the status quo. Startups exploit this opportunity.


IoT startup Afero goes end to end for security

At the heart of the company's platform is the Afero Cloud, which performs services like security and includes long-term data storage. Devices with the Afero ASR-1 Secure Radio Module, which uses the low-power Bluetooth Smart protocol, will connect to that cloud with encryption end to end. Other types of IoT devices can communicate with Afero-powered products through cloud-to-cloud integration, but without the same security, the company says. For security, Afero looked to the larger world of digital security for best practices. For each session, the device and the cloud service both are authenticated using an elliptic-curve key exchange, usually with 256-bit key pairs.



Quote for the day:


"Leadership is an opportunity to serve. It is not a trumpet call to self-importance." -- J. Donald Walters


December 16, 2015

Move Fast and Fix Things

The first thing we do when starting an experiment is enable it for a tiny fraction (1%) of all the requests. When an experiment "runs" in a request, Scientist does many things behind the scenes: it runs the control and the candidate (randomizing the order in which they run to prevent masking bugs or performance regressions), stores the result of the control andreturns it to the user, stores the result of the candidate and swallows any possible exceptions (to ensure that bugs or crashes in the new code cannot possibly impact the user), and compares the result of the control against the candidate, logging exceptions or mismatches in our Scientist web UI.


Why fail fast when you can learn?

Start-ups are comfortable with the prospect of failure - it comes with the territory. When a start-up's new idea, feature or service does not work it is quickly amended or removed altogether and the business moves on to the next idea. Failing fast has become a mantra in the digital age. Traditional businesses - and particularly CIOs - are regularly encouraged to follow the start-up community in their willingness to experiment and to fail. As long as the failure is small in nature, recognised quickly and appropriate action is taken to stop or adjust the experiment then, CIOs are told, everything will be OK.


Experts predict what 2016 will bring for DevOps and IT

“Thinking about log data may seem too far in the weeds for most tech industry professionals. However, using analytics to monitor, manage and gather insights from logs will be the only near-perfect way to make sense of the increasingly complex and cloud-based architectures.” Log management isn’t exactly new or cutting edge, but Beedgen believes that 2016 will see more vendors trying to move into the log management space,  ... The sharing economy has changed the way businesses engage customers and deliver services, and that includes IT through aspects such as cloud services, microservices, APIs and more. Fitz predicts, “Next year this ‘Uberfication of IT’ will turn into a ‘Balkanization of IT,’ driving stakeholders to demand better insight, governance and control of federated technologies to integrate adoption, usage, monitoring, security, cost control and more across shared services.”


The Dark Side of Wearables: How They're Secretly Jeopardizing Your Security 

As wearable devices make their way into the workplace and corporate networks, they bring a host of security and privacy challenges for IT departments and increase the amount of data that data brokers have to sell about an individual. Jeff Jenkins, chief operating officer and co-founder of APX Labs, talked about the security and privacy of wearables during a panel interview with Tech Pro Research at CES 2015. Because wearable devices are designed to be small and portable, Jenkins said, "you have to make sure you're thinking security first and you're thinking about the information that's being generated by them. You have situations where it's no longer just personal data that may be exposed or compromised, but also potentially operational data, that could be sensitive in nature."


Top 15 security predictions for 2016

In putting a security spin on the holiday song, “It’s the most predictive time of the year.” Not that those in the industry – even the best informed – have an infallible crystal ball. It’s that being effective in an ever-more-rapidly evolving threat environment means looking ahead. An accurate prediction can help an organization protect itself better. A wrong one can mean less ability to prevent or respond effectively to a breach that can damage reputation, the bottom line and more. So, here are some best guesses about 2016 from more than a dozen vendors and analysts.


The Internet crisis coming January 1, 2016 is way worse than Y2K

on January 1, 2016, anyone with a phone that’s more than five years old will not be able to access the encrypted web, which includes sites that are extremely important for most people to access, like Google, Facebook, and Twitter. The population this change will most affect are residents of the developing world, where up to 7% of people could find themselves without Internet because their 5+ year old phones don’t pass encryption muster. Most sites are encrypted. If you see that https with a green lock at the start of a URL, that means the site has been certified, and you know that you’re on, say, the real HelloGiggles, as opposed to a dastardly impostor hellbent on destroying all the cat videos in the world. No, but in all seriousness, encryption means that you can browse the Internet with an easy mind, and not worry that one wrong click will jeopardize your security.


In Virtual Reality, Exercise Bike Becomes a Race Car

With several virtual-reality headsets for consumers coming out this year—including Oculus’s anticipated Rift—excitement is growing around applications like gaming. But virtual reality has long been used for rehabilitation, including exercising. A 2011 study from the University of North Carolina at Charlotte, for instance, found that when people thought the intensity of a virtual-reality workout increased, so did their motivation. Inside the headset, VirZoom cofounder and CEO Eric Janzsen challenged me to a race-car race. I leaned to hug corners on tight turns and pedaled faster to speed up my car. When I rolled over what looked through my headset like rougher ground, I was forced to pedal harder to keep up the same pace.


Top 5 Shakers: Outlook on the Future of Mobile Technology

It might work different but there will be no popularity for anything that doesn’t serve privacy and no design that is invasive to the environment will become dominant either. Right now the phone market is cold and without innovation. The only drivers are more and better computing power and maybe a better camera. I am really bored by what the major manufacturers are throwing in the market right now. There are some interesting ideas around and startups and lesser manufacturers are at least trying to bring them to market. However the market segment is too small and far from gobbling up a significant piece of the market, which is currently served by large brands primarily, and that means it won’t drive user culture change.


Why Microsoft will beat Google in the enterprise cloud war

It's easier to get started with Google's tools, for example, but Microsoft provides greater flexibility and support for critical IT deployment needs, according to Keitt. Office 365 customers have more options when it comes to licensing for apps and data that will be hosted by Microsoft partners; access to the platform in a shared environment; and using dedicated Office 365 environments. "Google doesn't provide that deployment flexibility," Keitt says, and adds that Google for Work only supports multi-tenancy deployments. Vanessa Thompson, research vice president at IDC (CIO.com and IDC are both owned by IDG Communications), says both platforms are gaining momentum. "As the level of comfort for cloud-based solutions in general increases, there will be uplift across both solutions."


Software-as-a-Service: What businesses need to know

Software-as-a-Service (SaaS) is a new distribution model that is rapidly gaining popularity with businesses all over the world. A branch of cloud computing, SaaS lets businesses and consumers lease a particular piece of software from a third-party supplier, who delivers it over a network connection – most commonly the Internet. As with other examples of cloud computing, this provides a number of benefits in terms of flexibility, scalability and affordability, which is why it is hardly surprising that many businesses have been willing to embrace SaaS. ... The fact that businesses are no longer purchasing their software outright, as they did with previous distribution models, is mirrored by the growth of other cloud sectors and, indeed, other industries. Resource sharing is gaining more traction in both business and consumer markets, enabling much greater efficiencies to be achieved.



Quote for the day:


"You can't think your way out of a box; you've got to act." -- Tom Peters


December 15, 2015

Still Dreaming of the Paperless Office?

Going paper-free means putting an on-going strategy in place, which also encompasses technology, to ensure the project does not stall. This is where the IT department can step up to the plate as it understands the solutions available and can prioritize departments to move forward first, such as those driven by regulatory change, for example. By moving through departments in a chain reaction, an efficient digital transformation program can be put in place. ... We have to be realistic. Going paper free isn’t going to happen today, or even tomorrow. But there are steps that companies can take now to start the digital transformation process. Believe me your competition will be thinking about it even if they haven’t taken the plunge, so don’t get behind the curve.


6 Game-Changing Social Media Trends for 2016 – The Influencer’s View

Social media will be at our fingertips, and people will be more connected than ever. Gemio, a wearable bracelet being delivered to market in spring, 2016, aims to connect tweens and teens both in person by locating other friends wearing the tech, and on the related social app. ... Consumers are simply drowning in content and it’s being perceived by many as just noise with little attention being paid. In order to overcome the apathy towards content, marketers are going to have to ensure that the content they produce in 2016 is clearly targeted and personalized to address not only the overall customer experience, but each one of the points along the buyer’s journey up to the purchase and beyond to realize life-time customer value.


The Vital Role CIOs Play in Bottom-Line Growth

While the CIO’s role remains tied to technology, that technology is far from fixed. Just in the past few years, we’ve seen the increasing use of such developments as cloud computing, big data analytics, BYOD, and even more. Unlike in past decades, these technologies have the potential to affect every person within the organization, not just in what they do for their jobs but how they perform them. This is by no means a light responsibility for CIOs. To effectively make these types of decisions, CIOs need to be more in tune with the business objectives of their organizations than ever before. That requires CIOs to be a valuable player on the executive board, a credible voice that fellow executives will listen to. CIOs also need to learn the best ways to explain their ideas to those who may not be intimately familiar with new technological concepts.


A requiem for Yahoo

Things only got worse when Yahoo started cycling through CEOs—and CEO scandals—like most people change underwear. I got renewed hope when Google exec Marissa Meyer took over in 2012, but her tone-deaf moves to restrict telecommuting even as she installed a nursery in her own office didn't help. More to the point, she hasn't managed to deliver the turnaround she promised when she took the job.  Still, I'd love to see Yahoo return to its former glory, but it's hard to imagine exactly how that's going to happen. The company still enjoys massive traffic to its sites and services, but they're no longer considered cutting-edge. With big-ticket hirings like David Pogue and Katie Couric, Yahoo is now a media company, and a pretty mainstream one at that.


Advanced Security Service Insertion in OpenStack Cloud

OpenStack security groups offer a first line of defense for securing east-west traffic — that is, traffic between virtual machines. The OpenStack Firewall-as-a-Service (FWaaS) plugin can help you configure firewall rules and policies on firewalls or Intrusion Prevention Systems (IPS). Unfortunately, these simpler solutions come with some limitations: security groups operate at the instance level, and FWaaS works on virtual routers within a project. The way FWaaS is currently implemented in OpenStack, a single set of rules is applied to all virtual routers on all subnets, which limits their flexibility and capabilities, thereby preventing companies from the deployment of enterprise-critical production workloads.


Data Center Trends – Are You A Gate Keeper or the Leader of a Business Critical Function

Owning the entire data center stack means that you can affect change without disruption. It also means that you can establish metrics for efficiency and performance at all levels of the stack, from energy input to work output. You can establish metrics because you now have visibility into all parts of what makes the system that is a data center work. Not only do you have visibility, but you have the ability to more easily cross train, to implement more effective change management, and you can do much better long range maintenance planning. ... With top down ownership for the DC Stack the DCO is able to more effectively work with the entire executive team to define a strategic data center ownership document for the company.


How organizational agility will save and destroy your company

Organizational agility is talked about a lot. Indeed, in recognition that industries are changing fast, many organizations have agility in one form or another as a bullet in their corporate strategy. But if you look at most organizations, it just isn't making the huge difference that the pundits claim it will. Why is that? Business agility is hard to attain. ... These elements are compounding. Meaning, if you have a change in market segmentation or new market creation and your underlying technology changes, your organization has to adapt to both changes simultaneously, compounding the complexity of the change and making it all the more important that your organization is nimble.


Couchbase 4.1 delivers greatly-enhanced SQL capabilities

Beyond SQL support per se, Couchbase now supports the mainstream RDBMS concepts of covering indexes and prepared statements. Covering indexes allow a DBA or dev to create an index on a combination of columns in a database table that match the sort order and/or filtering criteria used in frequently-occurring queries, often underlying reports. Such indexes allow the queries to run much more quickly. ... For queries that are run frequently, this can mean a big performance boost. Combined with support for covering indexes, the prepared statement capability makes Couchbase much faster for frequently-run queries. In fact, Couchbase says customers can expect "2-3x Faster Query Performance."


Nuance tames IoT interface woes with new developer tools

Using an application-specific interaction model will help create better products. IoT devices don't need to recognize the entire range of English speech, just a subset of commands tied into what the device is supposed to do.  Once developers have a model set up, it can then learn from users' speech patterns to improve and morph based on how people actually operate a product. Developers are in complete control over what anonymized speech data is fed back into their models, too.  According to Kenn Harper, the senior director of mobile devices at Nuance, Mix will eventually be available in multiple pricing tiers, including one that allows developers to just pay as they go for what they need with minimal support, and another that includes a higher level of partnership between Nuance and an end customer.


IBM's Watson Taps APIs, Learning Centers For IoT Expansion

"One of Watson's strengths is its scale," Karns said. It can handle multiple streams of data, sorting out the correlations as needed. For instance, when IoT sensors are used with operating machinery or systems they will generate hundreds of megabytes per second of status data that must be monitored and analyzed. IBM's new Watson IoT announcements build on developments earlier this year. In March the company announced a plan to invest more than $3 billionover the next four years to build a dedicated IoT business unit staffed by more than 2,000 consultants, researchers, and developers. In October IBM announced plans to acquire most of the assets of The Weather Company, and said it would use many of those components to create a foundation for its IoT cognitive computing efforts, and as parts of the company's Insight cloud services.



Quote for the day:


"Nothing so conclusively proves a man's ability to lead others as what he does from day to day to lead himself." -- Thomas J. Watson