January 03, 2016

Enterprise Architecture - Guiding Principles

The usefulness of principles is in their general orientation and perspective; they do not prescribe specific actions. A given principle applies in some contexts but not all contexts. Different principles may conflict with each other, such as the principle of accessibility and the principle of security. Therefore, applying principles in the development of EA requires deliberation and often tradeoffs. The selection of principles to apply to a given EA is based on a combination of the general environment of the enterprise and the specifics of the goals and purpose of the EA. The application of appropriate principles facilitates grounding, balance, and positioning of an EA. Deviating from the principles may result in unnecessary and avoidable long-term costs and risks.


How to Flush DNS

There are wide arrays of DNS issues that can arise at the network administrator or power user level. For the end-user; however, the majority of DNS problems arise from either bad configuration entries or the local computer’s DNS storage requiring flushing. Independent of the type of operating system, many home computer users will input the DNS Server for their respective Internet Service Provider (ISP) incorrectly resulting in a failed Internet connection. Each ISP will have a slightly different configuration process; however, the IP address of the DNS server for your home network to use will be provided on registration for service. Many times the ISP will use the address for their actual DNS server, where others it will be the same as the Gateway IP for the service


The Disciplined Agile Framework

IT departments are complex adaptive organizations. What we mean by that is that the actions of one team will affect the actions of another team, and so on and so on. For example, the way that your agile delivery team works will have an effect on, and be affected by, any other team that you interact with. If you’re working with your operations teams, perhaps as part of your overall DevOps strategy, then each of those teams will need to adapt the way they work to collaborate effectively with one another. Each team will hopefully learn from the other and improve the way that they work. These improvements with ripple out to other teams. The challenge is that every area within IT has one or more bodies of knowledge, and in some cases published “books of knowledge”, that provide guidance for people working in those areas.


Designing the Business of IT

One of the core benefits that organisations can expect is a more cost-efficient IT environment. Senior IT leaders from MunichRe, Shell and Achmea, as well as research from Gartner, predicts that IT4IT will help organisations manage an increasingly complex IT estate in a more cost-effective fashion. It will also free up time and budget for innovation and new products. They feel the Reference Architecture provides a strong framework for managing multi-sourcing approaches, which are becoming more prominent in organisations around the world. Another key benefit of IT4IT is that it is not being introduced as an alternative to methodologies or frameworks such as TOGAF and ITIL.


Google's 'Lego' Smartphone, Smarter TVs: What We're Excited About In 2016

The Internet of Things should continue to provide the foundation for the technology industry's ambitions next year, framed by machine learning, analytics, networking, and ever-smaller devices. Connected sensors will proliferate. Intelligent software agents will learn new tricks that automate discrete tasks in a way that's similar to Gmail's Smart Reply service. Robots will emerge from private businesses to begin grocery deliveries on public sidewalks. If regulatory approval can be secured, drones will begin lawful package deliveries, following in the footsteps of flying contraband couriers.


TLS Client Authentication

Why TLS client authentication? Because that’s the most standard way to authenticate a user who owns a certificate. Of course, smartcard certificates are not the only application – organizations may issue internal certificates to users that they store on their machines. The point is to have an authentication mechanism that is more secure than a simple username/password pair. It is a usability problem, especially with smartcards, but that’s beyond the scope of this post. So, with TLS clientAuth, in addition to the server identity being verified by the client, the client identity is also verified by the server. This means the client has a certificate that is issued by an authority, which the server explicitly trusts.


Market Police Deploy New Algorithm Weapons Against Spoofers

“We have to capture every trade now,” O’Brien said. “In today’s markets it’s all about analyzing patterns and contexts.” Yet given how rapidly fraudsters can change their methods to hoodwink human beings, outwitting surveillance software could be even easier. Algorithms are sophisticated but they’re incapable of determining whether a flurry of buy and sell orders are legitimate or unlawful. “The surveillance tools are merely the first line of defense,” said Haim Bodek, founder of Decimus Capital Markets, a New York-based algorithmic investing firm. “These tools can help bring suspicious activity to the attention of regulators, trading venues and brokers, but they’re a poor substitute for a compliance program that monitors activity across affiliated accounts and groups of traders.”


2025: the five key attributes for your business surviving the next ten years in tech

The two make-or-break traits that rose to the top for these leaders were being able to spot new opportunities predictively and being able to innovate in an agile way. The survey also asked these leaders how prepared they believe their organisations are in each of these two dimensions. The gaps were quite remarkable. While 62% of those surveyed identified predictively spotting opportunities as being very important for their businesses, only 12% thought that their businesses had this capability. And only nine percent believed their organisations were capable of innovating extremely well in an agile way.


Podcast: Portfolio Management & The Agile Extension

In agile, we need to be prepared to constantly adapt our plans. That approach works extremely well at the project or initiative level, but at an organizational level, budgets and plans tend to be longer term and less adaptable. The current rate of change often means that those plans are negated and organizations find it difficult to adapt quickly to changing market conditions. We need to take the concept of backlog management and apply it at a higher level to programs and portfolios so that we are able to adaptively respond to changes in the world around us. The traditional definition of project success has been on time, on scope, and on budget. Those constraints still exist, but they are not the driving factors today.


Cybersecurity in 2016: will it come down to luck or leadership?

Unfortunately in most respects, 2016 won’t change much: users will still unknowingly click on malicious links; IT departments will still be bad at staying up to date with patching; the bad guys will continue to attack; and the tide of misery from breaches will persist. What matters most is whether your organisation will be a victim or not. Of course you could do nothing, and be lucky. But the only way to control your fate is to lead your organisation to the high ground based on a well-considered, security-first strategy. It is important to remember that, despite their claims, most security vendors cannot help you. Within the market we see too many 'me too' vendors, who’s main focus in on the staple of detection.



Quote for the day:

"It is literally true that you can succeed best and quickest by helping others to succeed." -- Napoleon Hill

January 02, 2016

5 Aspects of Cloud Computing to Watch Out For in 2016

The best part is that there is no need to buy expensive software licenses. Any software application upgrades, and the security feature aspects are the sole obligations of the cloud service provider. When it comes to efficiency, flexibility, reliability, and scalability the cloud undoubtedly triumphs over the rest.  Staying competitive in today’s world demands high levels of investment in technology in its various avatars. But enter cloud computing and all your worries go away thanks to ‘rent, don’t buy’ policy so strikingly espoused by it. It is easy to stay on top of market opportunities and retain your competitive edge with cloud computing. The future of cloud computing will only get brighter.


Technology Will Create New Models for Privacy Regulation

The average cost per user of a data breach is now $240 … think of businesses looking at that cost and saying “What if I can find a way to not hold that data, but the value of that data?” When we do that, our concept of privacy will be different. Our concept so far is that we should give people control over copies of data. In the future, we will not worry about copies of data, but using data. The paradigm of required use will develop once we have really simple ways to hold data. If I were king, I would say it’s too early. Let’s muddle through the next few years. The costs are costly, but the current model of privacy will not make sense going forward. If I ping a service, and it tells me someone is over 18, I don’t need to hold that fact.


Artificial Intelligence Finally Entered Our Everyday World

Ng’s prototype relies on a technology called deep learning. Inside the massive computer data centers that underpin Baidu’s online services, the company runs massive neural networks—networks of hardware and software that approximate the web of neurons in the human brain. By analyzing enormous collections of digital images, these networks can learn to identify objects, written words, even human faces. Feed enough cat photos into a neural net, and it can learn to identify a cat. Feed it enough photos of a cloud, and it can learn to identify a cloud.


The CEO of Google's £400 million AI startup is going to discuss ethics

Defending why Google hasn't revealed the members of its AI ethics committee yet, Hassabis said "it's very early days" and "there's lots of scrutiny on this". He said he'd like to get everyone "up to speed" on artificial intelligence first. "We wanted to have a calm, collected debate first," he said. "At some point we will reveal who these people [on the ethics committee] are and what issues are being discussed." Hassabis also assured the audience that he will not allow DeepMind technology to be used in military applications. Hassabis also revealed that he spoke with Hawking on the topic of AI a few months ago. "I think [Hawking] was quite reassured about how we specifically were approaching AI," said Hassabis.


Ten digital trust challenges

It’s not just the challenge of keeping up to speed with technological developments. It’s whether and how the current design of our private and public institutions needs to adapt to cope with these changes and to restore the trust of society – digital trust. In June, to mark the 800th anniversary of the Magna Carta, we looked at how institutions (organised and purposeful interactions of people based on contract, law or culture) must create and maintain trust through legitimacy, effectiveness and transparency, and how global megatrends like technology are driving the need for a design transformation and a bold new charter for our digital world. Here we take a look at 10 digital trust issues that in our view institutions must grow new capabilities to address.


Security threats, hackers and shadow IT still plague health IT

As a starting point, Hopfer suggests that CIOs take an inventory of the cloud services running within their organizations to assess their security posture. The exercise of evaluating what types of applications employees are running can shed light on the tools they need to support the business objectives of the enterprise. ... As hackers grow more sophisticated and attacks mount, security is a primary concern for CIOs in all industries, but it carries a special importance in healthcare owing to the sensitivity of the data involved. Moreover, much of the information contained in health records is unalterable, and, taken in composite, makes for a remarkably full profile that criminals can put to use for all manner of fraudulent ends.


How to defend your business against the worst hackers have to offer in the New Year

When it comes to crystal ball gazing in the tech world, the rule of thumb is not to do it as you only end up looking like an idiot in 12 months’ time. This time, though, the sad truth of the matter is that predicting the shape of the IT security threatscape for next year really isn't that hard: 'more of the bloody same' pretty much sums it up. But while exploit kits, DDoS attacks, and ransomware will all continue marching into the enterprise and doing damage, these threats will also evolve to become more dangerous. Here's five IT security predictions to mull over as you recover from your New Year's Eve party.


Big Data Industry Predictions for 2016

In 2016, automated personalization will be a critical business benefit that big data analytics will begin to deliver in the coming year. Companies will continue to seek competitive advantage by adopting new big data technologies and allowing machines to simulate subjective ‘squishy’ data – including human communication cues such as nonverbal behavior, facial expressions, tone of voice. Big data analytics makes this possible by assimilating vast amounts of information, including the types of data that were too slow and expensive to collect and analyze in the past, such as communications and case records for knowledge workers. As the machines get better at interpreting a variety of data types and collating it with vast quantities of structured data, they can begin to improve and accelerate both employee-owned business processes and customer-facing experiences.


Using Redis As a Time Series Database: Why and How

One of the first questions brought up when talking about Redis and its use as a time-series database is “what is the use or purpose of a time-series database?” The use-cases around time series databases are more related to the data involved - specifically that your data is structured as a series of events or samples of one or more values or metrics over time. A few examples include (but are not limited to): Sell price and volume of a traded stock; Total value and delivery location of an order placed at an online retailer; Actions of a user in a video game; and Data gathered from sensors embedded inside IoT devices. We could keep going, but basically if something happened or you made a measurement, you can record that with a timestamp.



Quote for the day:


"Unless you try to do something beyond what you have already mastered, you will never grow." --Ralph Waldo Emerson


January 01, 2016

Happy New Year, techies ! 


Algorithms: Turning Data Into Products


Algorithms rely on data. If you can get results from clear data, you can spot patterns, such as why a query is returning the wrong results, according to Surabhi Gupta, engineering manager at Airbnb. For companies such as Google and Airbnb, algorithms are their "product." In the simplest terms, a Google search algorithm has to produce an effective search result. That search result is the company's product. Airbnb's algorithms have to connect travelers with those offering accomodations. Practical expediency governs how algorithms are used and referenced. In the business world, algorithms are built for speed. "You are working with people with the expectation of immediate answers," said Google's Marshall. "Your algorithm has another constraint on it." In the end, a developer is taking a sub-optimal solution that runs fast, and comparing it to the optimal solution to see how close the two compare, he added.


The Impact of IoT on Data Science and Analytics

Of all the trends that will shape data science and analytics over the next few years, the Internet of Things (IoT) promises to have the most profound impact of all. In keeping with the publishing tradition of saying goodbye to one year, and hello to a new one, with top prediction lists, I have complied my thoughts on what is in store for the IoT in 2016 (and beyond). ... Disintermediation will be the word of 2016, as the tipping point has been reached and companies start reaping benefits of the investments in automated decisioning systems which will evolve in AI (yet another way in which robots will emerge). By removing human touch points from especially administrative processes, massive layoffs will make headlines. And public debate will rise on the ethical aspects of robotization in our society.


Will new regulations affect fintech startups in Hong Kong?

Fintech, or financial technology. The ubiquitous yet mysterious word usually references startups that are using technology to provide alternative or “disruptive” financial solutions. Fintech has been a buzzword as of late, rising as one of the most compelling sectors in Hong Kong’s startup scene. Attend any startup event or conferences touting creativity and you’ll hear something along the lines of how Hong Kong is well positioned to rise as a fintech hub akin to Singapore and Australia.  This would be exciting as fintech can ease payment processes and money transfers, generally moving a traditional industry forward. Hong Kong has already seen an increase in fintech-centric accelerators:



The Biggest Security Threats We’ll Face in 2016

Data sabotage can be much more difficult to detect than the kind of physical destruction caused by Stuxnet. That’s because data alterations can be so slight yet have enormous consequences and implications. Anyone remember the Lotus 1-2-3 bug back in the 90s that would produce accounting miscalculations in spreadsheets under certain conditions? That was an unintentional error. But attackers could get into financial and stock-trading systems to alter data and force stock prices to rise or fall, depending on their aim. ... There’s no evidence yet that the Juniper backdoor was installed by the NSA; it’s more likely that an NSA spying partner—possibly the UK or Israel—or a US adversary installed it.


Continuously Improving Your Lean-Agile Coaching

Rachel Davies describes a compatible approach in her book Agile Coaching. She was an original member of one of the first, most prolific, longest running extreme-programming (XP) teams at ConneXtra, and she is now an agile coach at Unruly. Joseph Pelrine, a computer and social-complexity scientist and leading XP expert, has a similar perspective. He uses complexity science to explain the theory behind agile and Scrum and uses social complexity to guide and coach self-organising teams. This view aligns with the coach role that Kent Beck, creator of XP, gives in the book Extreme Programming Explained. .... While each of these authors expands on some of aspect of lean-agile coaching, they all describe a role with all the aspects I mentioned before: hard and the soft skills, teaching/training to support growth and development, and guidance and support during delivery.


Cybersecurity and the Twenty-First Century Board of Directors

Just as boards require directors with expertise in finance, today they must also have directors with experience in cybersecurity. It takes qualified board members to provide oversight by knowing what questions to raise and how to assess management's responses. Symantec recognized this a few years ago when they recruited U.S. Air Force General Suzanne Vautrinot to the board. During her 31 year tenure with the USAF, "she led large-scale, diverse, global organizations that operate, extend, maintain, and defend global networks." Not only does General Vautrinot have the advanced degrees and board experience, she also "oversaw a multi-billion dollar global cyber enterprise with 14,000 military, civilians, and contractors.


Simpler management motivates Ethernet SAN investments

"It encouraged the SAN and Ethernet networking teams to work more closely together and closely with the systems team," Masseth said. Before, the FC guys thought the Ethernet team didn't understand lossless, or the importance of uptime. Now, Masseth said, whenever UA has an outage, incident or complex build to tackle, fingers aren't pointing at the other team. "They roll up their sleeves and find and fix the problems." Ethernet-based storage protocols offer attractive cost profiles through reuse of existing network infrastructure and management expertise, said IDC's Casemore. Lower cost when scaling out storage infrastructure was important to 35% of survey respondents when considering Ethernet SAN options. Masseth found that FCoE did reduce costs for UA, but this might not be the case for other builds, he warned.


Async await with Web Forms over multiple postbacks

Support for asynchronous procedures (using async / await) is great in C# and VB languages, and works very well in desktop (WinForms, WPF, console and others) applications. But there are web applications, like based on ASP.NET Web Forms, where support for asynchronous procedures are much less exposed. Microsoft itself states, that support for asynchrony (using async / await or other methods) is only limited to offload working threads, increase throughput and all asynchronous procedures must complete work before rendering phase (generating HTML). But there are also much more useful scenarios, where asynchronous procedure is started in some postback, and completed in one of subsequent postbacks, so executing spans over multiple postacks. This allow for UI driven asynchronous processing, which is useful for most web apps.


Thriving On Data #4 - Data Apart Together

The modern reality of technical evolution is that the conservative approach is the one that embraces delivery and operation changes more aggressively and focuses less on individual technologies. This view on information underpins the Business Data Lake which Capgemini co-innovated with Pivotal in 2013 and has since been adopted by both Informatica and EMC. Data Apart Together is not simply about how you combine data; it’s about recognizing that information often is apart for a reason. It is partner data they don’t want to share in the raw, it’s personal information that has to be kept in a specific geography, or its separate due to an acquisition and the sheer volume of information makes it unreasonable to coalesce into a single environment. Data Apart Together is therefore about how you enable different business units to derive insight across all the available information and not simply that which is directly available.


With potential Ford tie-up, Google looks to take back self-driving car lead from Tesla

For Google, the move would get their technology into more vehicles without them having to invest large amounts of capital into manufacturing. And, it's clear that Google wants to move the project forward since they'll be structuring their self-driving vehicle division as its own company under the new parent corporation, Alphabet next year—potentially including a carpooling competitor to Lyft or Uber. When asked what he thought of the potential partnership, Gartner analyst Ken Dulaney said that it makes "lots of sense." "Google needs the experience of production distribution and marketing, and Ford needs the breakthrough talents of Silicon Valley," Dulaney said.



Quote for the day:


"The result of long-term relationships is better and better quality, and lower and lower costs." -- W. Edwards Deming


December 31, 2015

7 Technology Resolutions For a Better 2016

It's 2016 and there's a feeling of hope and renewal in the air. That can mean only one thing: It's time for some New Year's resolutions. What did you vow to change this year? Are you going to learn a new skill? Pay off your credit card debt? Lose 40 pounds? Whatever your plans are, don't forget to throw in a few resolutions that involve the technology in your life. The best part of tech resolutions is they're fairly easy to keep and can improve your life almost right away. We've got seven suggestions below on how to make technology central to your plans for an awesome 2016.


Immutable Layers, Not (Just) Infrastructure

Immutable infrastructure is an effective application delivery workflow, but the deployment process is slow and resources are often underutilized. Building images and creating new hosts on every application update leads to a deploy process that can take 10 minutes or more. If there’s only one service per host, it usually does not use all the available CPU, memory, and disc resources on the host. If only 20% of resources are used, then the remaining 80% is wasted expense. Schedulers like Nomad, Mesos, and Kubernetes allow organizations to split applications and infrastructure into separate immutable layers, which speeds up deployment times and increases resource density, while still maintaining the benefits of immutable infrastructure. 


Software Licensing Audits: Is Your Company Prepared?

Violating license agreements can be expensive. Six defendants recently pled guilty in a software piracy case worth more than $100 million. While it wasn't an enterprise company left holding the bag, the outcome illustrates the consequences. In enterprise settings, most noncompliance is unintentional, which usually means the company did a poor job of managing its software licenses. If a company does not go to court, at minimum it will likely have to "true up," which means pay any licensing fees owed for software overuse. That can easily mean six or seven figures in large organizations. Licensees may also be subject to fines and penalties outlined in the license agreement. If the matter goes to litigation, the causes of action usually include breach of contract and copyright infringement, whether or not the noncompliance was willful or negligent.


How will blockchain technology transform financial services?

Bitcoin’s open source blockchain, described as a “permissionless” system, means it is decentralised and open to anyone. UBS and Microsoft are both working with blockchain start-up Ethereum, which runs a similar open source technology, and allows for the smart contracts that can execute trades automatically. But many in banking, wary of losing their grip over operations or of upsetting regulators, see the future in closed, or permissioned-only, networks. Almost two dozen of the world’s largest banks, including JPMorgan, UBS and Barclays, have thrown their weight behind R3 CEV, a start-up venture, to set up a private blockchain open only to invited participants who between them maintain and run the network. It forms part of an effort to build an industry-wide platform to standardise use of the technology.


Waterfall-to-Agile transition: Five tips from Bose

Bose adopted Agile development in 2003, after having become frustrated with the Waterfall methodology. CIO Rob Ramrath said Bose had trouble with Waterfall's "unknown unknowns," or ambiguity inherent in the process. He said the company "made a decision to burn the ships," and move to Agile development, which, he said, provides a structured way to avoid ambiguity in the development process and to pull business customers into the development process. Here are five recommendations that came out of the panel for a Waterfall-to-Agile transition:


Metatheory and enterprise-architecture

By contrast, a metatheory provides a consistent description of the context-space itself – the parameters and trade-offs underlying that context-space, much as above. As a theory-of-theory, a metatheory provides a frame in which to identify where each type of theory would work well – and where it wouldn’t. Hence on complexity, for example, Roger Sessions argues that we should aim to eliminate all complexity; John Seddon argues instead that we should aim to embrace complexity, and that trying to eliminate it only makes things worse. Which of them is right? If we were looking for a single consistent theory, one of them surely must be wrong? But actually they’re both right - in the right types of context. Equally, both of them are wrong – for the wrong type of context. To use a well-worn architects’ expression, “It depends“…


Microsoft outlines its cloud and server integration roadmap for 2016

Microsoft is planning to make generally available its tenth release of BizTalk Server in the fourth quarter of 2016. Before that, in Q2 of next year, Microsoft will release a Community Technology Preview of BizTalk Server 2016, followed by a beta of that product in Q3.BizTalk Server 2016 will align with Windows Server 2016 (due out in Q3 next year), SQL 2016, Office 2016 and the latest version of Visual Studio. The latest BizTalk release will support SQL 2016's AlwaysOn Availability Groups both on-premises, as well as hosted on Azure. Microsoft plans to tighten the integration between BizTalk Server and various application programming interface connectors, such as the ones to Salesforce.com and Office 365, to enhance hybrid on-prem/cloud scenarios.


Hybrid Cloud – Taming the Digital Dragon

Often the somewhat rigid structures and processes of IT departments, such as fixed employment or procurement via RFP, aren’t the most innovation-encouraging activities. This means CIOs can easily source their functional requirements, such as delivery and support of a SAP system, but they struggle to engage personnel who can devise innovative new ways in which it might be used to extend a successful digital strategy. That’s a much more rare skill set and is often concentrated in small startup businesses, where domain experts seek to exploit their considerable assets of knowledge areas. They in turn urgently need reference clients and problem statements to build their business around, and so very dynamic fusion can be achieved with regards to shared goals of digital innovation.


An Evaluation Guide to Application Lifecycle Management Software Solutions

Application Lifecycle Management tools can help improve software quality, cut costs, shorten time to market, and enhance collaboration by clearly outlining workflows, and helping you stay on top of your artifacts and processes throughout the lifecycle. What's more, advanced integrated ALM solutions also offer simple ways to export reports, greatly facilitating compliance audits in the above-mentioned safety-critical industries. Right, so there's a solution (or at least significant help) available for some of the most pressing difficulties you're facing. Should you just run to the store, grab an ALM platform off the shelf, and sit back to watch the extra money flowing in? Well, here's the thing: Application Lifecycle Management software come in all shapes and sizes, and finding the one that perfectly suits your processes can be problematic.


The Tech That Will Change Your Life in 2016

Voice-operated electronics are poised for a quantum leap in accuracy and intelligence in 2016. Talking offers a more natural way to interact with devices that need complex input but aren’t exactly keyboard-friendly, such as TVs, sound systems and household electronics. Voice arrived in a big way in 2015 when Microsoft’s Cortana virtual assistant came to Windows 10, while Siri and Google Now turned up in cars and TVs. This year, expect voice control on more computers and an even wider range of gadgets, including the CogniToys Dino, a toy that uses IBM’s Watson to help answer questions, and Jibo, a talking family robot.



Quote for the day:



"Be a leader to be remembered, make people feel good about themselves and increase their belief in their own abilities" -- Gordon Tredgold

December 30, 2015

Healthcare IT: Hot Trends For 2016, Part 1

Several technology trends are converging to give patients advantages, such as improved sources of knowledge and fast, improved medical service. "In 2016, the debate will heighten as to whether patients -- or health consumers -- will be asked to do more or less to manage their health," said Dr. Stephen S. Tang, president of the University Science Center in Philadelphia. "The more information the health consumer has, the more analytics and control he or she may want." We'll each have more opportunity to monitor our health and wellbeing through apps and products that take diagnostics and treatments out of the physician's office and into the home, Tang said. Tang sees this as a positive: Providers and research institutions will take on the burden of inventing better solutions, rather than giving already-busy people a new set of responsibilities, he says.


Data Center Technology Startups to Watch in 2016

You won’t find hot SDN, cluster management, flash, or application container startups on this list. We specifically chose to narrow it down to companies we feel are addressing some of the biggest pain points in data center design and management. This isn’t meant to be an exhaustive list, but the startups listed here are trying to solve big problems in interesting, innovative ways. Feel free to suggest other companies that should be on this list by submitting comments below or on our social media channels: Twitter, Facebook, LinkedIn,Google+.


Effective Strategies for Data Leakage Detection

The central strategy and key resource involved in data leakage detection is pretty much the same, regardless of the amount of data or files involved: effective management of metadata. Many organizations don’t realize the real value of metadata, especially when it incorporates both conceptual metadata (the kind that comes from people’s heads and is therefore subjective) and logical metadata (the kind gathered with technology tools, which is very black-and-white and objective). If you haven’t acquired both types and resolved any discrepancies, you will not be able to interpret everything needed to manage a given data asset more effectively — because you are looking at only a “half truth.”


Five Cybersecurity Trends to Watch in 2016

To no one’s surprise, cybersecurity continued to be a key area of concern and struggle among organizations of all sizes in 2015. However, buried amongst the constant news cycle of new attacks and sophisticated breaches is the fact that more business leaders are understanding the importance of cybersecurity and its potential impact on the organization. Whether it’s a small operation within a niche industry or a major global corporation, everyone is at risk. As we prepare to ring in 2016, we have taken time to reflect on lessons learned in the past year and how these trends and major news stories in cybersecurity will affect the year ahead. Here are five things we’ll be watching for in 2016


NFV: Not Ready for Prime Time but Working on It

While real work began in 2015 on NFV MANO, our in-house analyst Scott Raynovich made the argument that the MANO model that was set up by the European Telecommunications Standards Institute (ETSI) has served its useful purpose. He says real-world NFV management is quickly morphing beyond the constraints of the ETSI diagram. ... Sure enough, at SDN & OpenFlow Congress in Germany in October, Axel Clauberg said the cloud VPN service Deutsche Telekom (DT) launched in March “was difficult.” The VPN service is based on OpenStack. Also at the OpenFlow conference, OpenStack came under fire for lagging behind the needs of NFV deployments. If OpenStack can’t do the job, other alternatives could emerge, ranging from proprietary technology to another open source group, such as OPNFV, filling the void.


Towards an Agile Software Architecture

An important aspect of agile software architecture is when it has to start. Opposed to the waterfall model where we have well-defined phases, in the agile world there is no certain point that people agree to be the starting one. One typical approach is to introduce sprint #0 – a special sprint where the development environment is configured and some fundamental decisions are made. A common pitfall with this approach though, is people tend to prolong it as they always find things that are “almost ready”. “One more week and we can start the regular sprints” is often heard. In many cases you find yourself already working on the system, without even having the user stories, because “it will be really cool to have that helper feature implemented in advance”. In such situations you should beforehand agree on an end date for sprint #0 – this could be the duration of a regular sprint or something close to it.


6 Strategic Projects Any Business Can Implement in 2016

As 2016 begins, now is the time for businesses (regardless of industry, size, product or service offering, or location) to take stock of all resources and initiatives, and plan strategy-centric projects to implement in the New Year. There are many projects any business can implement that, if executed successfully, can create fresh opportunities or drastically reduce the chance of costly missed opportunities. Projects are often pursued for the purpose of generating revenues, creating growth opportunities, seeking innovation or even increasing brand awareness, but it can be easy to get caught up in just day-to-day operations without recognizing the actual cost of missing some more basic projects.


Reader Forum: IoT and the automotive industry

As these commercial fleet vehicles solutions increasingly began to share information bi-directionally via the Internet, they have become a part of the Internet of Things. Today, the “connected car” is rapidly transforming the consumer automotive experience as manufacturers compete to provide a wide array of factory- and dealer-installed IoT options. These consumer-oriented IoT applications range from practical to entertaining. Audi, BMW and Mercedes demonstrated automated vehicles that assist with parking and lane changing at last year’s Consumer Electronics Show. AT&T partnered with Uber to enable passengers to watch college football games from tablets in the backseat. Signing up with General Motors, Audi and Ford, AT&T is aiming to hook up cars with Internet access to stream videos and games onto passengers’ mobile devices.


Why Information Governance Initiatives Matter

“The volume and rate of growth of data do not bring the greatest challenges to information integrity across healthcare. The tougher challenges to information integrity, availability and security require information governance.” Further discussions emphasized the various aspects and value of trusted information, including safe use of IT and interoperability. While many organizations are still in the beginning phase of implementing an IG program, a recent survey by Cohasset Associates revealed that 44 percent of respondents have established IG oversight bodies, 44 percent have seen modest to significant progress, 38 percent have included IG in their organization’s strategic goals, and 36 percent have designated senior executive sponsors.


Enterprise startups: Open source may be your only hope

The reason is that open source communities can be bigger than any particular startup or company. And, if you're going to have a real chance at solving a crazy complicated enterprise IT problem, you must bring an army. This is why mega-banks, retailers, etc. buy from mega IT vendors. It's not that they believe an IBM knows more than random Startup X. Instead, they opt to buy from a large enterprise software vendor because they're big enough to understand the problem, and to have the resources (and longevity) to tackle it. This isn't to suggest there's not room to disrupt enterprise IT. There is. Just ask Amazon Web Services. But, even cloud and open source aren't enough. AWS is hitting its stride in part because it increasingly looks and acts like the legacy vendors it's displacing. CIOs trust its scale.



Quote for the day:


"Some men see things as they are and ask why. Others dream things that never were and ask why not." -- George Bernard Shaw


December 29, 2015

Building an Agile Team: What Does DevOps Mean to You?

You don’t need to be a superhero. What you need to do is be smart enough to automate your job and progress through to make things repeatable and better. That’s really what DevOps has become. We’ve finally bridged the gap of development dropping operations with complete trash and saying, “Deal with it. It’s your problem now.” And then not taking responsibility when there are bugs and errors, and people are getting up at 2am to recycle services, and all that happens. ... Now in a big corporate environment, where you need to put line items on everything, DevOps became something that was easy to sell. They could say that they need these DevOps engineers and that there have been studies about DevOps, so now big corporations can buy into it. But big corporations do what big corporations do, so every single person needs a line item and a number.


Internet-connected homes open the door to hackers

When computers hold the reins, criminals can grab control in unexpected ways. That connected coffee maker in the office -- it wouldn't be much of a stretch for a hacker to put it into a continuous loop and brew coffee throughout the weekend, flooding the office, Mohan said. Mohan's company monitors lighting systems in large commercial buildings to help his customers improve energy efficiency. Enlighted also makes sure intruders don't take control of the lighting. "If I turned them on and off 10 times per second on Sunday, none of the fixtures would work on Monday," Mohan said. Mayhem could hit at home, too. Tech-savvy thieves could look at the settings of your connected thermostat, lighting and security system to figure out you're away on vacation. Can you say burgle?


Retailers are “in store” for dramatic changes, thanks to the IoT

The Internet of Things (IoT) will disrupt all industries, but there’s little doubt that retail will be one of the most disrupted. More so than companies in other industries, retailers are increasingly coming in direct contact with consumers that fully embrace digital transformation in their lives, including IoT-related technology and innovation. Retailers that want to be innovative and stay current with the latest technologies need to embrace the IoT and embed it into their operations not only to impact front- and back-office process efficiencies, but also to earn the loyalty of the next-generation consumer. Leading retailers are already developing strategies and plans to leverage IoT-related technologies.


Here's one of the most interesting predictions for the future of bitcoin

"A cryptocurrency market will have exchanges, it will have brokers, it will have speculators, it will have payment networks," he says. "The features of blockchain as a market are institutional adoption, integration with existing business processes, IT planning and budgeting, evaluating technology replacement." In other words, the two products are pitching at different audiences - one to consumers and currency speculators, the other to corporate IT departments. The crucial element in understanding all this is that while bitcoin's blockchain is the best known, it's not the only one. Blockchain is shorthand for the complex cryptography-based software underpinning the network. It regulates transactions and records who owns which bitcoins. It's faster, cheaper, and quicker than traditional payment methods.


Getting my Raspberry Pi Zero kitted out

The BCM43143 wi-fi adapter integrated in this unit is a low-power and low-CPU load device, so it really is an excellent companion for the Raspberry Pi Zero. If you then plug a combined wireless keyboard and mouse USB receiver into one of the ports of the Broadcom hub, you have solved your three basic needs - keyboard, mouse and network connection - and youstill have a free USB port. This is great stuff. ... The next thing I got for the Zero was a mini-HDMI video cable, so that I could get rid of the slightly clunky mini-to-full HDMI adapter. This is nowhere near as big of a deal as the wi-fi adapter was, and if you already have an HDMI cable that you could use with the adapter that is included with the Zero from most sources, then you probably want to spare yourself the expense of this cable.


Mobile Payments - More Secure Than Conventional Payments?

Mobile devices are often used to conduct online credit or debit card transactions where the consumer provides actual card numbers to the merchant. However, this is not a new topic and readers should refer to other sources to understand the risk and best practices related to traditional online transactions. Also, the security of online money transfer services between individuals is outside the scope of this article. So, despite the recent survey results, are mobile payments really less secure than using credit cards or cash? While cash has the advantage of seeming anonymous, there is little recourse if something goes wrong with a purchase and no automatic tracking of transactions. Given today’s ubiquitous video surveillance and affordable facial recognition technology, the perceived anonymity probably does not match reality in most cases.


The future of mobility

There are two profoundly different visions of the future of mobility. Fundamental differences center around whether today’s system of private ownership of driver-controlled vehicles remains relatively unchanged or whether we eventually migrate to a driverless system of predominantly shared mobility. There is also a critical difference about the pathway forward. The “insider” view believes that today’s system can progress in an orderly, linear fashion, in which the current industry assets and fundamental structure remain essentially intact. The “disrupter” view envisions a tipping-point approach to a very different future, one that offers great promise and potential societal benefits


CES 2016 will be full of wearables, but would you really wear them?

Wearables weren't always the obvious choice when people wanted to make a fashion statement with personal tech. For almost a decade, that honor has gone to the smartphone, whose metal bodies and glass screens have been the epitome of cool for almost a decade. But that's begun to change. Take the iPhone, which was the apex of tech fashion for years but has perhaps become too commonplace. And now that Google's Android mobile software has gotten good enough to be a decent Apple alternative, other phone makers are getting fashionable too. Whatever the reason, phones are everywhere, and now that they look roughly the same, they can't be the fashion symbol they once were. "You're starting to see the phone become the thing that's buried somewhere on you," said Raskin.


Test Run - Introduction to Spark for .NET Developers

Spark is an open source computing framework for Big Data, and it’s becoming increasingly popular, especially in machine learning scenarios. In this article I’ll describe how to install Spark on a machine running a Windows OS, and explain basic Spark functionality from a .NET developer’s point of view. ... The Scala interpreter has a built-in Spark context object named sc, which is used to access Spark functionality. The textFile function loads the contents of a text file into a Spark data structure called a resilient distributed dataset (RDD). RDDs are the primary programming abstraction used in Spark. You can think of an RDD as somewhat similar to a .NET collection stored in RAM across several machines.


Can AI Solve Information Overload?

Of course, we are already seeing how this works with business intelligence dashboards like the one from Domo. It’s not technically AI, but the dashboards help us make better decisions because we can parse the data easier. We see a visual representation of quarterly sales or software uptime and can then react appropriately. Eventually, dashboards will include AI components that make automated decisions based on the collected data.  “These solutions don't have to be orders of magnitude better than us at what they do to be useful,” says Stowe Boyd, a managing director for research at Gigaom. “In fact, a tool that does something no better than me but frees me from doing it – like a concierge bot that would make flight and hotel arrangements for me – would be worth a great deal.”



Quote for the day:


"A pessimist is somebody who complains about the noise when opportunity knocks." -- Oscar Wilde


December 28, 2015

The Most Innovative And Damaging Hacks of 2015

Not a week went by in 2015 without a major data breach, significant attack campaign, or serious vulnerability report. Many of the incidents were the result of disabled security controls, implementation errors, or other basic security mistakes, highlighting how far organizations have to go in nailing down IT security basics. ... But looking beyond the garden-variety attacks and vulnerabilities lends great insight into the future of malicious activity and how to defend against it. And 2015 had its share of intriguing invasions, each of which highlighted the modified techniques that lead to new forms of breaches or pinpoint areas in need of new defenses. The past year saw cyber criminals adopting innovative approaches and state-sponsored actors becoming bolder.


Google’s Quantum Dream Machine

Google and quantum computing are a match made in algorithmic heaven. The company is often said to be defined by an insatiable hunger for data. But Google has a more pressing strategic addiction: to technology that extracts information from data, and even creates intelligence from it. The company was founded to commercialize an algorithm for ranking Web pages, and it built its financial foundations with systems that sell and target ads. More recently, Google has invested heavily in the development of AI software that can learn to understand language or images, perform basic reasoning, or steer a car through traffic—all things that remain tricky for conventional computers but should be a breeze for quantum ones. “Machine learning is a core, transformative way by which we’re rethinking how we’re doing everything,” Google’s CEO, Sundar Pichai, recently informed investors.


Big banks battle startups with new apps and services

Startups enjoy three kinds of advantages over more established firms, according to Benjamin Ensor, another analyst at Forrester. “Firstly, they are not regulated. Secondly, [startups] do not have legacy systems that can make it difficult to do new things fast. They are also not constrained by legacy thinking that can sometimes hamper big, hierarchical established firms. Thirdly, startups have often been quicker to embrace new technologies,” Ensor says. Yet tech wizardry alone isn’t enough to help the established players. Instead, CIOs need to work hand-in-hand with CMOs who are developing solutions that “transform the customer experience” while also driving revenue growth, says Forrester’s Condon. That said, established firms such as CBW Bank, Stearns Bank, Barclays and TD AmeriTrade claim to be coming out with new and more astute financial services.


Innovation Risk & Return: Horizons, Uncertainty and the Teddy Bear Principle

The 3 Horizons approach can be used to manage different areas of future business concurrently, albeit with different managerial approaches given the different requirements and characteristics. It can give a view of how innovation and other business-building activity such as M&A could extend a company’s reach into new sectors. It can provide a time horizon to business growth in new and existing areas. It can give a perspective on the potential for new technology platforms and new markets ... Horizon 1 is where most managers feel comfortable. It’s where the highest degree of apparent certainty exists and, intuitively, the lowest risk. It has the highest proportion of incremental projects and rarely presents a “bet the business” option. Horizon 2 has higher corporate uncertainty, and Horizon 3 presents high corporate and industry uncertainty.


The World's Smartest Cities What IoT And Smart Governments Will Mean For You

"A smart city is a city that uses digital technologies or information and communication technologies—connected via an intelligent network—to address challenges within city communities and across vertical industries. These challenges may include parking, traffic, transportation, street lighting, water and waste management, safety and security, even the delivery of education and healthcare. A smart city relies on technological solutions that enhance its existing process to better support and optimize the delivery of urban services, to reduce resource consumption and contain costs, and to provide the means and the opportunities to engage actively and effectively with its citizens, with its visitors and with its businesses."


Mobile internet is now just the internet

First of all, the internet is finally reaching some kind of maturity – at least in the sense that it is a truly global, ubiquitous communications system – and therefore a stable foundation on which all kinds of new things can be run. Secondly, the smartphone will the key to everything for the foreseeable future. And finally, the emerging new tech-world order is a duopoly, consisting of Apple – with its product-design flair and mastery of marketing and supply-chain management – running a high-end, incredibly profitable, tightly controlled ecosystem made up of both hardware and software; and Google, with unchallenged mastery of search, a dominant (though not total) grip on Android, and huge investments in robotics, cloud services and AI controlling the mass market.


Digital leaders at DHL, CVS defend against, exploit digital disruption

Increasingly, DHL is turning to technology to build relationships with package recipients. In Germany, DHL is piloting an unusual partnership with Amazon and Audi that would enable DHL to deliver packages to the trunks of Audi customers. "It's something … that might not be recommended for countries with high security issues because you might find the package, but not the car," Ciano joked. "It's on the high end, the extreme of innovation." ... talent management isn't simply about recruitment; retention is also important, Tilzer said. Rather than lose skilled, in-demand talent to new opportunities outside the company, Tilzer said it's important to figure out how to create similar opportunities within CVS, a strategy that seems to be gaining momentum these days.


AngularJS in Action - An Interview With Lukas Ruebbelke

The first step when approaching performance in any application is to optimize the user experience. The next step is to apply tried and true architectural principles like composing your application with fine-grained, single responsibility units of code. There are still some tricks that you can do to get that extra bit of performance out of your application if you need it. If you are binding to a collection of complex objects, I will sometimes transform those objects into a shallower version of itself that only contains just the properties I need to display. One way data binding is another great optimization if you are not going to need to redraw the view. Manually adding pagination to a large list of items also helps. Anything you can do to reduce the number and complexity of the items you are binding to on the page is going to help.


The Next Wave of Cybercrime Will Come Through Your Smart TV

Smart TVs are essentially computers, with USB ports, operating systems and networking capabilities no different than smartphones. But unlike computers and mobile devices, smart TVs often don't require any authentication. "Basically with these TVs, if you are in the same room, you're always going to be treated like you're the owner of the TV," said Craig Young, a computer security researcher with Tripwire. ... Smart TVs don't run antivirus software, and it's questionable whether that would be a practical solution to stopping cyberattacks. While antivirus software could work, it also could degrade performance, and the question becomes "whether running security software on the TV is going to mean your Netflix is going to become choppy," Young said.


RESTful Considered Harmful

RESTful web service does not natively support many enterprise-grade features of APIs like batching requests, paging, sorting, searching and many others. There are competing suggestions, like query parameters, request headers, etc. I remember an hour long discussion about flexible searching API we had some time ago. ... RESTful web services are CRUD-oriented, rather than business- or transaction-oriented. Countless times we had to carefully map business terms into simple create/update/delete actions. World isn't that simple and not everything can be simply described in create or update sentences. And even if it can, often RESTful endpoints are awfully awkward and artificial.



Quote for the day:


"No amount of source-level verification or scrutiny will protect you from using untrusted code." -- Ken Thompson


December 27, 2015

10 Breakthrough Technologies of 2015: Where Are They Now?

The roads would be safer if nearby vehicles automatically shared details of their speed, direction, and other information over wireless links. This year Mercedes-Benz confirmed that its version of that technology will appear in 2017 E-Class models going on sale next year, and General Motors was reported to be putting car-to-car communication in the 2017 Cadillac CTS sedan. ... Alphabet continued testing its giant helium balloons intended to widen Internet access in 2015. In October the company signed an agreement with the government of Indonesia to give the technology its biggest test yet. In 2016 cellular networks serving the country’s 250 million people will begin to integrate the balloons into their networks, acting as extra cellular towers floating in the stratosphere.


Banks of the future are already here

The future is already here. One can pay subway fares by putting a smartphone with an NFC chip and banking application at the entry gate. No doubt, in a couple of years one will be able to do the same without a smartphone just by virtue of linking a credit card NFC tag to the NFC ring. To withdraw money from an ATM, one won’t need a bank card – it will suffice to log into online banking using a smartphone, then scan a QR-code and get access to the cash withdrawal menu. Skinner predicts that a new economy will be based on chips and online payments with a share of cash not exceeding 30 percent. However, even the most advanced governments have not succeeded to completely eradicate cash payments: e.g. in Sweden, the volume of non-cash payments has reached only 70 percent.


Five Principles for Leading an AgileCulture

Spotify is familiar with the downside of success. Following substantial growth a few years ago, its engineering team expanded and started to lose their nimble touch. Some companies might approach this problem from a process standpoint, but Spotify leadership seized the opportunity to re-orchestrate to an agile culture. Flash forward to today, and Spotify’s agile culture has made it easier for the company to go to market with ideas more quickly than ever before. That culture also paved the way toward success in a key area for digital business: attracting and retaining talented people. Organizations like Spotify and online retailer Zappos are among the growing tide that recognize that to compete in today’s digital age, agile is no longer optional.


2016 Could See Google Challenge WhatsApp With Chat Bots

The service will be similar to Luka.ai, a SIRI-like app that you can hold a basic conversation with about local restaurant recommendations, according to the Journal. Another comparable example is Facebook M, a virtual assistant service similar to Siri that runs on Facebook Messenger Powered by both artificial intelligence and a team of human beings, its being trialled by beta testers in the Bay Area, California and can book travel, find products or suggest a good gift. You can ask M to order Star Wars tickets, draw you a picture, even write you a song. In such cases it can be hard to distinguish if you’re chatting with a bot or a human.


How I Created A $350 Million Software Company Knowing Nothing About Software

It struck me that if I could build cheaper call center software, I could make my own softwarecompany — and have revenge on The Smirker. The stars must have been aligning for me because shortly thereafter, my college roommate, who I nicknamed “The Fro” (I give nicknames to everyone for whom I have a deep affection), called to tell me (brag) that the call center software startup he worked for had been acquired by Cisco. He hadn’t made much as a late-stage employee, he admitted, but he had a taste for what could be, and encouraged me to fly to Boston to discuss creating our own startup. “After all,” he said, “you’re good at selling shit.”


10 routes to IT job security

One of the quickest ways to irrelevancy in IT is to get behind the curve. That curve grows steeper with every passing year and the moment you get lost in the wash of progress, you are finished. Make sure you are always learning about the latest trends, keep yourself updated on security issues, ensure that you're up to date on everything new and shiny in the business. Take classes and/or workshops, and read, read, read. ... Yes, Sheldon Cooper can pull it off, but he's a fictional character surrounded by forgiving friends. In the world of business, you won't find many people that forgiving. So do not be a know-it-all. Even if you do know it all, don't show it all.


Collaborative Overload

Any effort to increase your organization’s collaborative efficiency should start with an understanding of the existing supply and demand. Employee surveys, electronic communications tracking, and internal systems such as 360-degree feedback and CRM programs can provide valuable data on the volume, type, origin, and destination of requests, as can more in-depth network analyses and tools. For example, Do.com monitors calendars and provides daily and weekly reports to both individual employees and managers about time spent in meetings versus on solo work. The idea is to identify the people most at risk for collaborative overload.


Bitcoin is Entering the Age of Practicality

The blockchain, at its core, is a database. It may be the Liam Neeson of databases, but still it's a database. This new age of practicality must be filled with companies solving real problems – problems that could not be solved before the gift Satoshi left for us (before returning to his alternate dimension). We as an industry must be able to look into every industry and every discipline and see what challenges a distributed, immutable ledger can really solve. We have debated on Reddit and other forums about what can be. But the new age must be filled with companies that not only see what can be, but build what should be. We have to embrace people from all disciplines and lend a ear to what struggles they have. We have to then be creative enough to innovate through cross-discipline association.


Debunking the biggest myths about artificial intelligence

These are real worries with immediate importance to how we use, and are used by, the current and plausible future of AI technology. If a doctor uses Watson (or Siri or Google Now or Cortana) as part of what proves to be a misdiagnosis, who or what is ethically responsible for the consequences? And might we one day face the issues of sentient machines demanding rights? The good news is that these worries are being taken seriously. Trying to define ethics, even between humans, is notoriously difficult. Society’s generally accepted ground rules are codified in a practical way by law and the legal system—and it’s here that practical answers to AI ethics are being developed.


Big Data Helps Alleviate Aviation Risk Management Problems

Probably one of the most important areas of aviation risk management to obtain immediate benefits from the utilization of Big Data will concern enhanced customer loyalty and offer programs. The ability to track responses to customer service surveys in real time now enables many airlines to enhance their advertising efforts in a way that tailors the benefits of specific offers to individual customers. For instance, by mining charter flight databases and merging information with customer files, some airlines may discover ways to offer attractive discounts to people who fly frequently to specific, remote locations. This type of tailored marketing would have proven impossible during previous eras. Today, it represents a popular new trend.



Quote for the day:


"A leader is a person you will follow to a place you would not go by yourself." -- Joel Barker


December 26, 2015

 Juniper VPN backdoor: buggy code with a dose of shady NSA crypto

The fallout from this report prompted NIST to retire Dual_EC_DRBG from its recommendations and to advise users to transition to other random number generators. After the NIST advisory, Juniper admitted that ScreenOS used the Dual_EC_DRBG, but claimed that it did so "in a way that should not be vulnerable to the possible issue that has been brought to light." Instead of using the P and Q constants recommended by NIST, which are supposed to be points on an elliptic curve, ScreenOS uses "self-generated basis points." Furthermore, the output of Dual_EC is then used as input for another random number generator called FIPS/ANSI X.9.31 that's then used in ScreenOS cryptographic operations, the company said at the time.


Change is Coming, and It’s IT-Fueled

We all know that BYOD stands for “bring your own device,” but within 10 years I believe we’ll know that acronym by its new meaning: “bring your owndata center.” But don’t take my word for it; by 2016, Gartner predicts that 30 percent of BYOD strategies will leverage personal applications and data for enterprise purposes. What that means is that the line between personal and enterprise data usage will blur. Now we see an unmistakable trend emerging – millennials are redefining not only when and where they work, but also how they get their work done. This is no passing phase, either. It will present an ongoing challenge for IT device makers and service providers – not to mention CIOs trying to formulate a coherent BYOD strategy – for years to come.


Interview With Stitch Fix's Brad Klingenberg

It is usually better if you are not the first to evangelize the use of data. That said, data scientists will be most successful if they put themselves in situations where they have value to offer a business. Not all problems that are statistically interesting are important to a business. If you can deliver insights, products or predictions that have the potential to help the business then people will usually listen. Of course this is most effective when the data scientist clearly articulates the problem they are solving and what its impact will be. The perceived importance of data science is also a critical aspect of choosing where to work – you should ask yourself if the company values what you will be working on and whether data science can really make it better. If this is the case then things will be much easier.


Can virtual reality transform the data visualization market?

Interestingly, a number of startups disrupting the big data virtual reality markets are gaming studios. And that is because gaming studios have had the extensive experience and the unique ability to analyze and visualize tonnes of data. It is high time the remainder of the scientific community and other industries leverage that expertise. But there is doubt if these startups are best placed to lead any mass adoption movement for virtual reality. An important factor to consider is that virtual reality startups are mostly project driven based and lack the mind-set to create products with industry wide applications. Another challenge highlighted by the skeptics is that there isn’t great content for virtual reality yet. Maybe true, maybe not. Undoubtedly, creating and telling a data story in an immersive environment is a mammoth challenge.


What the Blockchain Means for Economic Prosperity

This technology platform is open and programmable. As such, it holds the potential for unleashing countless new applications and as-yet-unrealized capabilities that have the potential to transform everything in the next 25 years. At its core, the blockchain is a global database – an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions, but virtually everything of value and importance to humankind: birth and death certificates, marriage licenses, deeds and titles of ownership, educational degrees, financial accounts, medical procedures, insurance claims, votes, transactions between smart objects and anything else that can be expressed in code. This ledger represents the truth because mass collaboration constantly reconciles it.


Investing In Artificial Intelligence

Consider the digitally connected lifestyles we lead today. The devices some of us interact with on a daily basis are able to track our movements, vital signs, exercise, sleep and even reproductive health. We’re disconnected for fewer hours of the day than we’re online, and I think we’re less apprehensive to storing various data types in the cloud (where they can be accessed, with consent, by third-parties). Sure, the news might paint a different story, but the fact is that we’re still using the web and its wealth of products. On a population level, therefore, we have the chance to interrogate data sets that have never before existed. From these, we could glean insights into how nature and nurture influence the genesis and development of disease. That’s huge.


Ghosts in the Machine

The near pervasiveness of social technology has delivered death back into our daily interactions. With the exception of our friends and closest kin, we typically encounter news of deaths through social media. The same feed that informs us about sports scores and plot twists on ‘‘Empire’’ also tells us, without any ceremony, that a life has come to an end. This could be a blurring of a sacred line, the conflation of the profound with something profane. But this flattening has a benefit: We can no longer avert our eyes from tragedy. We have seen how people used social media to ensure that Americans did not ignore the deaths of people like Freddie Gray, Walter Scott and Sandra Bland, amplifying them into a rallying cry for justice. The mass shootings in Paris and San Bernardino felt, somehow, closer to our lives because they played out on our screens and in our browsers.


Fresh Insights From Clayton Christensen On Disruptive Innovation

We’ve recently had an important insight about how the trajectories of technological improvement are different in different industries. In some industries the trajectory of technological improvement is very steep, like the disk drive industry where every eight years some firm was getting eliminated. In others, the trajectory of improvement is gentler, like in discount retailing. And finally in others, the trajectory is flat, as it was historically in higher education prior to online learning. This has important implications for disruption. When it’s flat, disruption doesn’t occur. New technology and business models can bring significant change to an industry where disruption hasn’t yet occurred, as Airbnb is bringing to the hotel industry.


Challenges for Data Driven Organization

Need for data capture and analysis have brought organizations to a point where it is important to merge and use various data systems and mart to harness the complete value of that data. So, new techniques and technologies need to be employed to achieve this goal. Organizations need to develop the basic infrastructure and capability to support data capture, data integration, data analysis and reporting. This also implies that you need to invest in new technology, upgrade legacy systems and do change management to train personnel. There is also a need for new technologies that can help satisfy the need for data maneuvering and consumption in an easier fashion.



IT Governance in a Digitally Disrupted World

Corporate history is littered with examples of companies that failed to see the significance of new technologies,or were too slow to act upon them. The digital disruption impacting on all sectors of the economyrequires organizations to embrace and leverage technologies more quickly than in the past, and with imagination. New business models are emerging that present opportunities and threats to established models. The rate and magnitude of technological change is both exciting and challenging and requires organizations to be more agile, flexible and creative. Globalization, increased competition, and heightened user expectations present organizations with significant challenges in continuing to be successful and remain relevant.



Quote for the day:


"Every time you have to speak, you are auditioning for leadership." -- James Humes