February 03, 2016

Make IT Delightful, and Other Ways to Enchant Your Employees

Satisfaction means our basic needs are met. Happiness means our emotional needs are met. Enchantment gives us meaningful experiences we didn’t even know we needed. And what better way than that to keep employees fully engaged? Yes, smart companies still must invest in fair compensation, diversity, family-friendly HR policies, work-life integration, playful environments and activities, perks, and a more holistic notion of well-being, as well as nurturing a values-based, purpose-driven culture that motivates people to work together for a greater cause. But the next step is to enchant employees in the same way you do customers.


Operations Challenges for the SDDC

For operations, moving to an SDDC architecture has the potential of adding more work to their already full plate. Shifting from physical to virtualized systems requires them to change how they monitor, manage and maintain the new infrastructure to comply with company security and regulatory compliance policies. They also need to help security and GRC teams achieve their goals of keeping the functional IT teams in their swim lanes, such as the networking team, while working in the virtualized infrastructure. On top of all this, operations has to make sure that they meet the business SLAs and the requirements for system availability and scalability.


Network Professionals Take On Increasingly Strategic Role in the Enterprise

The expansion of cloud computing brings both challenges and benefits to the networking team. Seventy percent say cloud will add complexity, while at the same time nearly the same amount (69%) stated cloud will enable the networking team to play a more strategic role. Software-defined networking (SDN) continues to rank high among organizations' network and data center plans. Forty-eight percent of enterprise organizations are actively researching plans around SDN and nine percent are piloting SDN technology. It's clear that they plan to be farther down the adoption curve in the future as 22% plan to be piloting the technology a year from now.


Headhunter dismisses 'rock star CIOs,' extols corporate values

Not culture, mind you — values. “Culture is tribal. Culture is esprit de corps, the tenure of your daily interactions,” Banerji said. The same company can have many subcultures. Marketing has its culture, IT another, the New York office has a different culture from the Boston office. And that’s perfectly OK, he said. But cultural independence shouldn’t be mistaken for core corporate values. “Values transcend function, they transcend geographies and times zones and business lines. They are the irrefutable tenets companies put forward to define who they are,” he said. It could be the corporate philosophy revolves around integrity, or creativity, or putting the client first.


Adapt, disrupt, transform, disappear: The 2015 Chief Digital Officer Study

Because the CDO role is just a few years old, it is not yet possible to determine whether companies with CDOs perform better in the marketplace than others. Indeed, some companies are flourishing without a single executive overseeing their digital transformation at the highest level — though most of these companies are already quite far along in their digital journeys. We believe, however, that less advanced companies would clearly profit by hiring one top executive to develop and carry out a coherent digital strategy. The goal of this study is to better understand which kinds of companies are hiring CDOs, who these new executives are, and how they approach the tasks in front of them — and then to look at how, specifically, the CDOs at several very different companies are taking on the demands of digitization.


How Barclays is cashing in on big data & Hadoop to stay ahead in fintech

It is fairly obvious then that even the most prominent fintech firms would not yet have the capacity to do the all this, at the scale an institution like Barclays can. However, just three years ago, Barclays did not have the capacity either. Simon said that historically the firm would have had to use a huge Oracle database, and "to process across all our small business customers on a daily bases it's about six weeks work of processing data." Six weeks is hardly useful for a small business under daily pressure to survive and trying to grow. Things have changed now though, Simon explains, thanks to the increased processing speed, and reduced cost of a Hadoop stack.


You’ve Been Hacked: How to Recover From the Nightmare

What’s next when you discover a hack at your facility? Healthcare organizations typically have detailed technical plans for closing access to networks, assessing damage and doing post mortems so it doesn’t happen again. But more than the technical repair that needs to go, organizations also need to have a plan for appropriately responding to the reputational hit that can occur from a hack. It’s more than just a PR department’s “problem.” IT executives will need to be involved to manage the fallout and craft responses that limit the damage to the organization’s reputation. It’s easy to botch. When retailer Target suffered a large cyber attack, the company tried getting the word out quickly on the extent of the attack and what it was doing to mitigate the damage and protect customers.


EU, U.S. Data-Transfer Deal Will Never Work

Steve Hunt, an industry analyst with Hunt Business Intelligence, initially reacted to the news with sarcasm. “That announcement makes me smile. I am actually thrilled about it,” he said. “I finally have a way to protect corporate secrets from government surveillance.” His tongue-in-cheek plan was to throw all sensitive data into a server, label the folder “European personal information” and “they’ll have to bypass.” Hunt, turning serious, said that such an agreement “would require policy and oversight that extends far beyond traditional government reach” and added that it would be “so costly and difficult that it would be practically impossible. It’s a promise without any possible weight behind it.” One of the many problems with such a move is audit efforts, confirming compliance.


How business outcomes are transforming IT spending

According to the report, 70% of respondents said it's critical that they're able to link IT investments to tangible business outcomes. So, if an understanding of IT's impact is this important, do these organizations feel that they are communicating that clearly enough? Well...not necessarily. Only 47% said that their organizations are doing an excellent or very good job at communicating how a particular IT investment impacted a business outcome. The remaining 53% said their organization needs a least some, if not significant, improvement in doing so. Not only did respondents say that identifying the impact on the business was important, but 68% of them said that, when making an IT investment decision, the business goals were more important than any of IT's operational goals.


Why I No Longer Use MVC Frameworks

Does a component-based Angular2 look a lot simpler? Not quite. The core package of Angular 2alone has 180 semantics, and the entire framework comes close to a cool 500 semantics, and that’s, on top of HTML5 and CSS3. Who has time to learn and master that kind of framework to build a Web app? What happens when Angular3 comes around? After using React and seeing what was coming in Angular2, I felt depressed: these frameworks systematically force me to use the BFF “Screen Scraping” pattern where every server-side API matches the dataset of a screen, in and out. That’s when I had my “to hell with it” moment. I’ll just build a Web app without React, without Angular, no MVC framework whatsoever, to see if I could find a better articulation between the View and the underlying APIs.



Quote for the day:


"No matter how you're treated or unappreciated, make the conscious decision to start each day anew as the best version of you" -- Carson V Heady


February 02, 2016

How to prepare for the IT department of the future

"IT needs to do some marketing and consider users as they do consumers. Is IT delivering only 80 percent of a service without following through? Are they rude? Inefficient? You're providing IT services to your users, and so 'brand' is so important. If your users aren't seeing the value in your services, then the company as a whole isn't going to think that IT has any value," says Simon Chapleau, CEO of Green Elephant. To change that, IT will have to focus on measurement and accountability, Chapleau says. By measuring user satisfaction with IT, and allowing users to grade the services they're receiving, IT can focus on what needs improvement and, in the process, get more done.


Job One for the CDO: Lay Foundation for Data Management

Often working through a matrixed organization, CDOs can help overwhelmed IT teams put the right strategic focus on analytics. If they succeed, business managers at all levels can use higher volumes and varieties of structured, semi-structured and unstructured data to make better decisions about customers, competitors and operations. But how specifically does a CDO accomplish this? The answer varies widely based on the circumstances and maturity of the enterprise. Rarely does a CDO inherit a pretty situation. In their report, “Top Performers Appoint Chief Data Officers”, Forrester analysts Gene Leganza and Jennifer Belissent point out that negative events such as security breaches or disappointing results often prompt the appointment of a CDO to improve data governance or assess new market or customer dynamics. 


Network-attached storage: The smart person's guide

NAS products, as with SANs, are starting to evolve beyond just large boxes filled with hard drives. Most major NAS suppliers now offer all-flash and hybrid disk/flash products. Other modern twists on NAS include products that automatically replicate their data into cloud storage and, as discussed above, versions with advanced clustering that are essentially SANs behind a NAS head unit. Whether these are the "best of both worlds" remains to be seen. Another trend is software-defined NAS, which allows businesses to build their own systems using commodity hardware. There's some irony to this, as business-class storage companies spent years explaining how their proprietary NAS systems were much better than homegrown file servers using independent NAS software.


Are Retailers Improving Cybersecurity?

"We have been in business or incorporation for almost two years now," Engle says of the R-CISC. "We have seen significant growth. ... We're seeing that the retailers are really getting a clearer picture of risk to their organization, and it's not just in the payment transaction." The R-CISC now has more than 100 merchants as members, he points out. What's more, R-CISC's close relationship with Financial Services Information Sharing and Analysis Center is aimed at ensuring that those member merchants are able to collaborate and share threat intelligence directly with the banking community, Engle explains. "We work extremely closely with the FS-ISAC," he says. "We have chosen to utilize the same technology and information sharing platform ... and our ISAC function is actually located in the same building as the FS-ISAC."


Tablet shipments down, but detachables catch on

Detachables are growing fast because end users see them as laptop replacements, IDC analyst Jean Philippe Bouchard said in a statement. He said Apple sold more than 2 million iPad Pros, while Microsoft sold about 1.6 million Surface devices, of which most were the Surface Pro and not the more affordable Surface 3. "It's clear that price is not the most important feature considered, when buying a detachable — performance is," Bouchard said. After Apple, Samsung and Amazon in the top three positions for the fourth quarter in tablet shipments, Lenovo finished fourth and Huawei was fifth. There were 66 million tablets of all types shipped in the quarter, down nearly 14% from the fourth quarter of 2014.


A Short Manual to Bring Change Successfully into Your Team

This is the first question every leader should ask himself before starting this big adventure, because it often turns out to be a rocky and lonely road. Have a look at the WoMan in the mirror and ask yourself before initiating a process of personal changes in your team: are YOU ready for modifications in your own behavior and attitude? If the answer to this question is a clear YES, without any hesitation, then go on and step into this surprising road of change and discover what will happen to you and all the people around you! But if you need to think a little bit longer about the YES or if “Yes?” sounds like a question, you should review your reasoning, double-check your intentions and convince yourself.


Asean organizations braced for cyber attack

“You only need to watch the news or surf the Internet to see what the modern-day hacker is now capable of. Implementing proper security measures is no longer an option, it is a must,” said Somchai Intiraworanont, president of XanSiam International. To ensure that the company plugs all potential security holes, it hired security provider Network Box to upgrade its firewall service to a unified threat management service package. “DDOS attacks were a problem before we deployed Network Box in the data center,” Intiraworanont said. “Today, we have been noticing a lot of zero-day malware getting stopped in its tracks. There have also been a number of intrusion attempts blocked.”


Phishing Attacks Among Greatest Plague Facing Healthcare

Phishing is not just aimed at the largest healthcare organizations; a recent survey by the Healthcare Information Management and Systems Society found that 69 percent of respondents have experienced a phishing attack. Security incidents involving those from outside the organization (phishing and other types of attacks) caused significant problems for some of the organizations responding to the HIMSS survey. Of all respondents affected by a breach, 21 percent reported the loss of data, and a total of 16 percent reported either significant disruption or actual damage to their IT systems. Attacks at Anthem and Primera were frighteningly easy, according to the annual report on healthcare security breaches, by Bitglass, a security solutions vendor.


Defending a network from the NSA

Whitelisting is the opposite of anti-virus software. That is, rather than allowing all software to execute by default and trying to block bad stuff, white listing defaults to blocking everything and only lets known good applications run. Perhaps realizing that many in the audience felt that whitelisting was impractical, Joyce hinted at using it on servers. As a rule, servers run less software than the computers used by employees, and the software is updated less frequently, making it easier to maintain the whitelist. Another area where he suggested whitelisting was outgoing traffic. Companies often allow all outgoing requests by default and then try to block known bad domains. I got he feeling the considered this a fools errand.


The need for cyber security skills in Australia balloons

It’s not just end-user enterprises looking for security skills, either. The federal government is ramping up its cyber know-how with agencies such as the Australian Security Intelligence Organisation (ASIO) and ASIS hiring, according to Acheson, and the vendor community is looking for skills too. Like corporate Australia generally, vendors are looking for a blend of abilities. Sam Ghebranious, regional director for CyberArk in ANZ, said that while technical capability is important, so are the soft, communications skills and the ability to articulate the security challenge that enterprises face. “You need to be able to relate to change management and understand the security policies of the organisation,” he said, adding that 80% of the success of a security solution came from getting users to change behaviour and use the solution.



Quote for the day:


"The majority of our problems are of our own making." -- Gordon Tredgold


February 01, 2016

Data Governance: A Roadblock for Analytic Ambitions

The shift to shared saving and risk-based reimbursement has revealed the cracks in data governance and information management infrastructures at many organizations that are having significant problems getting the data pieces in place to keep their heads above water. Michael Hunt, M.D., chief population health officer at St. Vincent’s Health Partners, a 275-physician medical group in Bridgeport, Conn., cites research that shows 70 percent of accountable care organizations don’t make money. “The data set for the Medicare Shared Savings Program requires reporting for 27 different quality measures, and many of those ACOs apparently couldn’t submit the appropriate quality data,” Hunt says. 


VMware NSX: 3 different use cases

Mike Feld, the interim CTO at Baystate Health, said that there's more demanded of IT in healthcare, but less money going into it because of shrinking budgets. Traditionally, all the data center pieces are independent and their infrastructure is older. "We needed to make a complete change," Feld said. "We couldn't just tweak a particular vendor, or replace vendor A with vendor B. We needed to completely redo the way we do IT, and hyperconvergence [was] essential." And, the key component to that hyperconverge strategy was NSX. Feld said they looked at products from Microsoft, Cisco, and OpenStack, but they didn't have the deep level integration at the abstraction level, which is why they chose NSX.


DDoS is most common cyber attack on financial institutions

Many organisations do not include DDoS mitigation as part of their security strategy because they do not see DDoS attacks as a real security threat, but failure to have systems and procedures in place to mitigate such attacks could expose any organisation to significant financial losses, particularly those that depend on interacting with customers online. Imperva Incapsula sais DDoS is a serious matter affecting e-commerce sites and corporate and online assets. ... “DDoS attacks can last several days, so it is vital to have a plan in place to deal with such a threat,” said Verizon’s Dine. This includes having a well-tested response plan that details what to do if initial DDoS defences fail, he said.


Big data success needs a data-driven culture

A decade from now, thanks to innovations in fields like robotics, cryptocurrency and genomics, companies will experience huge changes to how they operate. Editorial Director Sue Troy sat down with Alec Ross, Hillary Clinton’s former innovation adviser, to delve into what these developments will mean for technology leaders. In part one of the Q&A, read about Ross’ predictions on blockchain technology and how this technology underlying Bitcoin will affect impact legal processes in the next five years. In part two of the interview, Ross talks about how cognitive robots will affect the labor market and how U.S. companies compete globally. IoT may be about to change the way we think of food safety.


Why Laws for Robots are Doomed to Failure

Robotics and AI haven't come anywhere close to being able to build robots that would be able to comprehend or abide by these or any other sophisticated rules. A robot vacuum cleaner doesn't need this level of moral complexity. "People think about Asimov's laws, but they were set up to point out how a simple ethical system doesn't work. If you read the short stories, every single one is about a failure, and they are totally impractical," said Dr. Joanna Bryson of the University of Bath. Bryson emphasises that robots and AI need to be considered as the latest set tools - extremely sophisticated tools, but no more than that. She argues that AI should be seen as a tool that extends human intelligence in the same way that writing did by allowing humans to take memory out of their heads and put it into a book.


Bring Your Own Smartwatch: Mobility Management Vendors Prepare

IT can also use settings that limit notifications and messages displayed on the Apple Watch. An iPhone managed under the AirWatch platform can also be restricted as to whether or not its user can even pair it with an Apple Watch, according to Zakai. Good Technology has a different approach, designed specifically for Apple Watch. The company has released "Good Work" for the device, which enables IT to configure the level of detail shown in watch notifications. For instance, IT can determine whether a user will be able to see an email's sender and subject line only, or whether they'll be allowed to view a full message on the Apple Watch. Good has also announced support for secure Android Wear app development on the Good Dynamics Secure Mobility Platform.


Microservices in the Real World

The key point is that an SCS should be responsible for its own UI as well as its own data store. The system’s boundaries exhibit a vertical split along what in Domain Driven Design (DDD) is called “bounded contexts”. The integration of each SCS into the overall application happens in most cases within the browser via links and transclusion. These systems don’t share a common UI code nor common business logic. Each system may be maintained by a separate team using their very own preferred technologies. When done right, end users will fluently move between systems, crossing application borders simply by clicking links or hitting buttons – ideally without even noticing that they left one system and entered another.


Microsoft Tests Underwater Data Center

"Project Natick reflects Microsoft’s ongoing quest for cloud datacenter solutions that offer rapid provisioning, lower costs, high responsiveness, and are more environmentally sustainable," the company said. Using undersea data centers helps because they can serve the about 50 percent of people who live within 200 kilometers from the ocean. Microsoft said in an FAQ that deployment in deepwater offers "ready access to cooling, renewable power sources, and a controlled environment." Moreover, a data center can be deployed from start to finish in 90 days. ... The company is also considering a "deployment cycle" of 5 years each, which is the anticipated lifespan of the computers in it. "After each 5-year deployment cycle, the datacenter would be retrieved, reloaded with new computers, and redeployed," according to the Microsoft FAQ.


Microsoft and mobile: The headache that won't go away

If that rate of decline keeps up, Microsoft's phone business will pretty soon be nothing more than a rounding error when it comes to revenue. Plenty of people are now writing their obituaries for Lumia. And it's certainly hard to see where Microsoft can go from here. One option is to keep Lumia (perhaps rebranded as Surface) going for the same reasons that Google has got Nexus - as a way of showing consumers and manufacturers the potential of the software. The trouble for Microsoft is that consumers aren't interested and neither are manufacturers any more. That doesn't mean the Microsoft can't build hardware: Surface continues to grow and Hood said that following the launch of the Surface Book and Surface Pro 4 the tablet-PC device is likely to see continued momentum and growth as Surface Book becomes available in more countries.


Why 10 million developers are lining up for the Internet of Things

Sure, there are plenty of developers working on wearables and smart home applications. But the developers getting paid in IoT are working on the dull-but-necessary industrial applications, as last year's Developer Economics report unearthed. Any company that hopes to attract the hobbyists that dominate consumer-facing IoT applications needs to make it as easy as possible to get productive, which is why Google and Apple have been voted most likely to succeed. Regardless, as VisionMobile's latest report highlights: "Developer interest shouldn't be taken for granted, and hype alone cannot sustain developer involvement. For example, the amount of IoT developers targeting wearables dropped from 28% to 21% in 6 months' time."



Quote for the day:


"If you get bored with social media it's because you are trying to get more value than you create." -- @FastCompany


January 30, 2016

Cybersecurity report recommends test-hacking medical devices before and after release

White hat hackers are essentially the “good guys” of the industry. They are generally hackers or programmers that make their living through ethical means, specializing in computer and software security. They don’t always work with a particular company — sometimes they are the lone-wolf type. The important point is they don’t hack into systems or devices with the intent of causing harm. Instead, their goal is to find vulnerabilities and holes which may need to be patched in order to improve security. After finding a security flaw, they often provide the necessary documentation and aid to the system owner or admin to improve security.


Testing Tips For Today

Test scenarios aren't always one-way. They aren't always request-response. They aren't always server-pushed. Applications that employ WebSockets often contain a mix of communication patterns. To build your load test scenarios you'll want to record and playback WebSocket communications with your app to create realistic testing scenarios. You'll also need to handle messages pushed over WebSockets just like you would handle messages pushed using a traditional request-response, piggy-back architecture. Load test variables should include the time it takes to establish a WebSocket connection, as well as the time it takes to send a request over that connection. Finally don't forget to include tests for both text and binary data.


Great Little Inventions: Velcro

It is often said that one of the main qualities of geniuses is seeing what no one else sees. Undoubtedly, many people before De Mestral had walked through the countryside just to end up with spikes and thorns pinned to their clothes, yet for most people it was just a minor nuisance. In contrast, when in 1941 the Swiss engineer returned from a hunting trip through the mountain forests of Jura, he envisioned a solution where others could only see a problem. After plucking seeds from his clothes and from his dog’s hair, he came up with the idea of studying them under a microscope in order to understand how they managed to snag so stubbornly.


Finding Unexpected Allies Pt 1: Risk Management

Now, this seems like it’s too good to be true and the obvious question that most people will be asking is, “what’s the catch?” The catch that I’ve experienced is that you can’t simply email a bunch of business units in the bank and say “please list the business services you provide and the applications that support them”. The first problem with doing so is, what is an application? And what is a business service? Without a decent definition, the level of granularity that you might get, and the type of operation that gets identified, will be all over the map. You need to engage with each group to define concepts, so that you ensure some level of consistency.


The next 5 years: possible trends in business software

The growing popularity of platforms with big data capabilities means that more business software programs will likely emphasize real time data analysis in the future, also. This trend emerges in particular in the conduct of successful social media campaigns. The mining of consumer data now extends to a wide array of integrated social media platforms; coupled with sophisticated database technology platforms, this capacity enables companies to develop programs that respond more flexibly and in a far more tailored manner to individual customers. Eli Stutz in “The Future of BPM: 7 Predictions” argues that real time processes will give a fourth dimensional quality to some popular software programs used by businesses.


How healthcare systems can become digital-health leaders

High-quality, sustainable healthcare depends on IT-enabled services and a digital platform, but healthcare systems are still unclear on where to focus investment, what technologies provide the greatest benefits for patients and healthcare providers, and the return on investment. In 2014, we did considerable research into the economic value of digital technologies in healthcare and found that implementing technologies such as patient self-services, using digital channels rather than direct physician interaction, or patient self-management solutions can produce net economic benefits of 7 to 11 percent of total healthcare spending. Over this past year, our work on the ground has confirmed this original analysis.


Best practice advice for moving to the cloud

"For most organisations, moving to the cloud involves a shift in finances, because you're moving from a well-understood capital expenditure model to an operating cost-based model. That scares people sometimes." Hewertson says IT leaders must take time to explain that, while operational costs will rise, the long-term effects of depreciation will be lower as the business avoids a hit every few years when it needs to upgrade its infrastructure. To ensure everyone understands the potential risks and benefits, Hewertson has established a corporate risk board, which highlights the potential risks of the current operation at a formal level. Hewertson advises his CIO peers to use a similar approach to receive the broad support of senior executives and to help alleviate risk, particularly at an individual level.


The Neurologist Who Hacked His Brain—And Almost Lost His Mind

Kennedy called his invention the neurotrophic electrode. Soon after he came up with it, he quit his academic post at Georgia Tech and started up a biotech company called Neural Signals. In 1996, after years of animal testing, Neural Signals received approval from the FDA to implant Kennedy’s cone electrodes in human patients, as a possible lifeline for people who had no other way to move or speak. And in 1998, Kennedy and his medical collaborator, Emory University neurosurgeon Roy Bakay, took on the patient who would make them scientific celebrities.


IT governance: why does it matter?

With increasing regulatory requirements, both auditors and IT managers are adopting CobiT as the compliance framework for IT controls. The CobiT IT Process model has helped convey a view of IT that is understandable to business management, auditors and IT, while providing a basis for IT functions to be organised more effectively into a process structure with accountable process owners. The roles of IT and audit for IT governance are separate yet intertwined. IT professionals often have a poor understanding of what controls are and why they are needed. Audit can help with this by working together with IT, providing training that facilitates a change in the culture of the IT organisation and adopting a focus on controls.


Building Security In versus Building Security On

‘Building Security In’ means that security must be built into the developer culture. Developers should understand that security is now part of their job. This is accomplished by building security into their incentives, providing them the training they require, and showing them that security is a valued skill to the organization. There should be a well-defined software security group with equally well-defined policies and tools to measure efficacy. A common pushback from developers is that security can decrease productivity. There are tools that will in fact do the exact opposite, demonstrating an increase in productivity by as much as 15 percent. These tools live in the developer’s environment and scan code as it is being created.



Quote for the day:


"Winning means you're willing to go longer, work harder, and give more than anyone else." -- Vince Lombardi


January 29, 2016

Growing the IoT: Chaos vs. Curation

It’s already happening, since many of the consumer IoT offerings center on, well, a center. You install a "brain" that all of the intelligent elements in your home connect with and through. It makes decisions and also has the primary connection with the cloud. The individual devices aren't doing everything among and by themselves. And in commercial, industrial and governmental areas, it's fairly obvious that pure peer-to-peer device communications without any curation won’t cut it -- something, or someone, needs to act as curator to ensure that things are handled well and properly, rules are applied and rights are respected. The Napster vs. iTunes example parallels this perfectly, and we are facing similar issues with the IoT.


What's Next? 2016 Priorities For High-Performing CIOs

In the new year, many CIOs may find themselves at a critical juncture. They can either build themselves into successful business leaders or they can risk being relegated to second tier “care and maintenance” roles in which they will provide technology support for the strategies and goals of others. Based upon hundreds of conversations we’ve had with CIOs over the past 12 months, it is clear which path high-performing IT leaders will take in 2016. We predict CIOs will take the following steps, among others, to distinguish themselves as strategists and decision makers as they proceed down the leadership path:


EU May Be Aiming to Block U.S. Tech Companies, Schumer Says

Negotiators from the U.S. and the European Union are racing to meet a Jan. 31 deadline to find a replacement for the Safe Harbor agreement that permits user data from companies like Facebook Inc. to be transferred to the U.S. The Safe Harbor pact was struck down last year by the EU’s highest court. "I am worried that the Europeans are using -- that their real motivation is to keep our companies out because they’re so superior to the European companies," Schumer, the likely successor to Senate Democratic Leader Harry Reid, said in an interview Wednesday. His comments come ahead of a Thursday meeting of the Senate Judiciary Committee, where Schumer has a seat. The panel is scheduled to address a bill, H.R. 1428, that would grant European citizens the same data privacy protections as U.S. citizens.


Address IoT security risks before it is too late, urges report

“In the next few years our lives will be surrounded by devices connected to the internet that will digitalise every step we take, convert our daily activities into information, distribute any interaction throughout the network and interact with us according to this information. “Never before has what we do in our physical lives been closer to the digital world. It is precisely the blurring of the line between the digital world and the real world that represents the changes introduced by the IoT. “The future of IoT is unwritten, but only through collaboration and insight can we achieve a secure foundation.” The report was developed by Telefónica’s cyber security and IoT divisions in association with a range of partner organisations operating in the field of cyber security.


A Reference Architecture for the Internet of Things

In the IoT world we don’t only define the goal on the user level (i.e. by application), but things themselves can work towards certain goals without actively including the user. In the end the devices still serve the user but they act autonomously in the background – which is exactly the idea of ubiquitous computing. In order to get a better picture of the term “context” we will first introduce our context model and then jump into the introduction of our reference architecture. Context defines the state of an environment (usually the user’s environment) in a certain place at a certain time. The context model usually distinguishes between context elements and context situation. Context elements define specific context, usually on the device level.


Building a solid cloud governance model for 2016

A final consideration when building a cloud governance model is compliance. This is closely coupled with information security, but there are additional considerations. In particular, watch for details regarding users' responsibility when using a cloud service that is in compliance with a particular regulation. For example, AWS cloud services are PCI compliant, but users of those services must contract with PCI auditors to complete other requirements. Similarly, several, but not all, AWS services are suitable for use with protected healthcare data under the Health Insurance Portability and Accountability Act regulations. Governance strategies should prevent the use of noncompliant services, and ensure compliant services are not used in noncompliant ways.


The need for cyber security skills in Australia balloons

“Yes, they are hard to find, and if you go to an industry and bring a security expert from there, those people have been aligned in a particular areas and are focused on that area only. The best source is the big four management consultant organisations because they invest in people, technology and the soft skills set.” It’s not just end-user enterprises looking for security skills, either. The federal government is ramping up its cyber know-how with agencies such as the Australian Security Intelligence Organisation (ASIO) and ASIS hiring, according to Acheson, and the vendor community is looking for skills too. Like corporate Australia generally, vendors are looking for a blend of abilities.


How To Protect Security Product Investments

The larger the enterprise, the more likely it is that it has many, many security tools. Staff might not learn, use, or update any number of these, perhaps either because there is something off-putting about the technology (some kind of complexity, for example) or because it is one more task on top of an already overwhelming pile. When these tools stay connected and running on the network in a misconfigured, outdated fashion, they become vulnerabilities for attacker entry and liabilities for the enterprise. Security products can come with native remote access capabilities. When enterprises use such products and leave remote access open with default or easily guessed credentials, this turns a security advantage the enterprise should leverage into a security vulnerability.


One crucial exercise for a healthy business

Many organizations, such as technology firms, that have been in this industry for years have the capacity and vision to adjust to financial downturns -- meaning strategic plans and budgets are modified periodically. Depending on their customer base or their global reach, businesses have to assure investors that they can meet market and consumer expectations. ... Conducting effective planning routinely includes an operational budget and a scorecard that aligns with the long-term business plan. With this data in hand, leadership should also have a documented analysis of the business strengths, weaknesses, opportunities and threats that govern how well the company is functioning.


Teach your team to embrace change and create an Agile mindset

Leaders must remember that people are emotionally attached to the way they work -- it is a large part of their lives -- and if they have a lot of experience in the "old" way of doing things, they will be even more emotionally attached to it. Therefore, cognitive arguments with a collection of facts about Agile, or any new idea, aren't necessarily persuasive. What is more persuasive is finding ways to help people care about those facts -- by having conversations that uncover how people are truly feeling about the new idea. Be ready -- these feelings may not necessarily be rational -- but this will allow the leader to truly address what is standing in the way of making Agile, or any new idea, happen.



Quote for the day:


"Be brave. Take risks. Nothing can substitute experience." -- Paulo Coelho


January 28, 2016

Oracle is Planning to Kill The Java Browser Plug-in

"Oracle does not plan to provide additional browser-specific plugins as such plugins would require application developers to write browser-specific applets for each browser they wish to support," the company said in a white paper that outlines migration options for developers. "Moreover, without a cross-browser API, Oracle would only be able to offer a subset of the required functionality, different from one browser to the next, impacting both application developers and users." The main alternative proposed by the company is to switch from Java Applets to Java Web Start applications. This type of application can be launched from the Web without the need for a browser plug-in.


Local Governments Need Governance and Training Amid IT Security Risks

Government agencies approach risk management in different ways, and some may have more mature approaches than others. Additionally, governments need to deal with the fact that residents increasingly expect “24/7 access to government information and services, on mobile devices, without regard for how government develops, manages and pays for that access and those services.” The report says that local governments need to become “technologically proficient” in order to “identify, assess and manage technology risks.” There are four different ways that local governments can achieve this goal, the report notes.


As Cloud Services Mature, Three Key Lessons Learned

As for the integration challenge, 61% indicated that it remains a major pain. In fact, a quarter of the respondents said that at least one cloud application project was abandoned due to the inability to link enterprise data to the cloud applications. While I expect that proportion to decline over time, due to improved tools and smarter implementation teams, it will remain a challenge. An important corollary to the need to integrate external cloud apps to internal on premises data is the fact that we now have a two-way challenge. The rise of XaaS means that many organizations now have valuable data in the cloud that needs to be accessed by their on-premises systems.


The Basics of Web Application Security

Security is a cross-functional concern a bit like Performance. And a bit unlike Performance. Like Performance, our business owners often know they need Security, but aren’t always sure how to quantify it. Unlike Performance, they often don’t know “secure enough” when they see it. So how can a developer work in a world of vague security requirements and unknown threats? Advocating for defining those requirements and identifying those threats is a worthy exercise, but one that takes time and therefore money. Much of the time developers will operate in absence of specific security requirements and while their organization grapples with finding ways to introduce security concerns into the requirements intake processes, they will still build systems and write code.


Hadoop and Big Data: The Top 6 Questions Answered

You will certainly need some folks with Hadoop skills, database/data management skills, system admin skills, programing skills and analytics skills. Currently, the market isn’t oversaturated with Hadoop admins that possess all of these skills along with several deployments and a few years of management experience under their belts ... As for the data scientist, they’re great if you can find one (and afford him/her). You’re talking about someone who gets statistics, algorithms, coding, data and database technologies and the underlying business logic. In many cases, companies are leveraging the skills of multiple individuals already on staff as opposed to hiring a dedicated data scientist.


Unikernels – The shiny new object in the cloud

Unikernels take the concept of minimalistic operating systems to the next level. It is a specialized OS which is compiled exclusively for the program that runs on it. So, a developer can create an extremely compact executable that not only has his code but even the operating system. Unikernels are single-user, single-process, single-purpose, specialized operating systems that strip away unwanted functionality at the compile time resulting in a stand-alone, self-contained unit. The new unit of deployment contains the entire software stack of system libraries, language runtime, and application, compiled into a single bootable VM image that runs directly on a standard hypervisor.


13 Frameworks For Mastering Machine Learning

Over the past year, machine learning has gone mainstream in an unprecedented way. The trend isn't fueled by cheap cloud environments and ever more powerful GPU hardware alone; it’s also the explosion of frameworks now available for machine learning. All are open source, but even more important is how they are being designed to abstract away the hardest parts of machine learning, and make its techniques available to a broad class of developers. Here’s a baker's dozen machine learning frameworks, either freshly minted or newly revised within the past year.


The clearest sign yet that Microsoft is cool again

Despite a booming R&D budget, the research done within Microsoft's labs rarely got productized, as I've written before. Or, as Ahmad Abdulkader, an engineer on Facebook's applied machine learning team, and formerly of Microsoft and Google, told Bloomberg, "Microsoft totally separated its research arm from the rest of the company and almost made it optional to contribute to the rest of the company. Google took the exact opposite approach." This sometimes left Microsoft scrambling to catch up with innovations released elsewhere. Under CEO Satya Nadella, Microsoft's R&D team is actively engaging with product teams to ensure all those R&D billions contribute to tens of billions in sales. But, this isn't the clearest sign of Microsoft's rebirth.


Bimodal IT Strategies and Their Impact on Data Governance

Unfortunately, this dual infrastructure approach rests on several false premises. The first is that startup DevOps teams are all using open source software, and that this is what enables agile application development. The reality is far different. Most startup DevOps teams use a lot of paid software and services out of necessity because they don’t have the time or resources to customize and tie together a bunch of open source applications to meet their IT infrastructure needs. If they did spend the time building this infrastructure themselves they would never get their businesses off the ground. Drawing on scores of on staff engineers and deep pockets, only the biggest of the big tech companies are building IT infrastructures that are based on open source and their own custom-built software.

Managers’ 3 Mental Blocks to Strategic Planning

The typical solution is to spend a lot of the corporate strategy team’s time and money on streamlining the strategic planning process and clarifying the accompanying instructions. This does make a difference, but strategists will be much more likely to help managers consider the long-term – and so help the firm make good long-term decisions – if they spend less time on planning process and more on counteracting executives’ operational mindsets. CEB data show that this is six times more successful in terms of improving long-term thinking during the strategic planning process.



Quote for the day:


"Whenever an individual or a business decides that success has been attained, progress stops." -- Thomas J. Watson


January 27, 2016

Cyberwarfare in 2016: The Virtual Battle for Your Information

Regardless of how closely the treaty is followed by either country, it’s clear to the world that this is a unique issue that deserves special attention. Your main concern shouldn’t be corporate espionage as such; attacks on corporations are your biggest danger should cyberconflict arise in any capacity. Chances are that you or an immediate family member works for one. In the rare event that isn’t the case, you absolutely trust your personal data to one or do regular business with one so they have your financial information. Cyberconflict between any organizations large enough can result in corporations being caught in the crossfire.


Windows 10 at six months: Ready for primetime?

One of the most controversial design features in Windows 10 is its new update model, which removes the ability of consumers to control which updates get installed. Businesses have more knobs and levers, thanks to the November 2015 addition of Windows Update for Business, but those tools are made for IT pros and are either invisible or frighteningly complex for less sophisticated users. Still, this is a vision of where the future of computing has to be, and there really is no pain-free path. Asking users, even technically sophisticated ones, to make individual trust decisions over dozens of updates per month is ludicrous. The result, historically, is predictable: many users succumb to information overload or bad advice by disabling updates completely.


The real reason Microsoft open sourced .NET

.NET itself is changing, as the recent name change for the open source version (from .NET Core 5 and ASP.NET 5 to .NET Core 1.0 and ASP.NET Core 1.0), underlines. .NET Core doesn’t cover as much as the full .NET 4.6 framework. The same goes for ASP.NET 4.6 and 5 (which has the Web API but not SignalR, VB or F# support yet). The newer versions don’t completely replace the current versions, although they’ll get the missing pieces in the future. They’re also built in a new way, with faster releases and more emphasis on moving forward than on avoiding breaking changes. That’s the same shift you’re seeing across Microsoft. Over the last decade, building Azure has taught the company a lot about the advantages of microservices for what would otherwise be large, monolithic applications.


Wear your world

If you’re one of those who constantly complain about clothes bought online not fitting right, technology is here to help. LikeAGlove makes leggings that measure the shape of the wearer and provide the details in an accompanying app, which helps users filter out clothes that would not fit right. Workout freaks get to invest in shorts that track running statistics and Radiate makes T-shirts that glow to display the muscle groups that you just used in that last set. Scientists are also working on clothing that can maintain temperature according to the ambient conditions, using everything from pockets of liquid and air to studying how squids modify the wavelengths of light they reflect.


Service-oriented business: Maritz transforms IT culture

Learning was a key part of the Maritz IT overhaul. Paubel said Maritz's IT personnel received training on soft skills, sales and marketing. That process began at the highest level within IT. "We trained the management first," Paubel said, noting that the objective was to help the top IT managers understand what the new IT organization would look like. ... As the cultural shift continued, the Maritz IT group changed its values. The department reworked the management templates that define how employees earn merit increases and promotions. Employees are no longer rated on how many projects they complete, or how many tickets they close, but on how customers perceive them.


Microsoft Open Sources Deep Learning, AI Toolkit On GitHub

Microsoft attributes the surge in interest to the growing number of researchers running machine learning algorithms supported by deep neural networks -- systems modelled on the processes in human brain. Microsoft says that many researchers believe such systems can enhance artificial intelligence applications. The rapid improvements over the past few years in the speech recognition capabilities of applications like Apple's Siri and Google Translate, and in the image recognition capabilities of Google Photos, suggest that belief is well-founded. As mobile and Internet-connected devices proliferate, AI can be expected to become even more important as a way to facilitate function without traditional keyboard-based interaction.


Creating Your Enterprise Cloud Connectivity Strategy

The goal is to create optimal business agility, where the business can adjust or scale according to market demand. Enterprise cloud connectivity uses a variety of secure (and fast) connection protocols to allow organizations to integrate with network, storage, compute, and even user environments. The biggest difference has been the ease of creating these connections and how they can help transform a business. In the past, these connections were made manually and required a lot of administration. Today, major providers are offering easier ways to integrate with their cloud resources.


Microservices in the Real World

Self-Contained Systems (SCS) describe an architectural approach to build software systems, e.g. to split monoliths into multiple functionally separated, yet largely autonomous web applications. The key point is that an SCS should be responsible for its own UI as well as its own data store. The system’s boundaries exhibit a vertical split along what in Domain Driven Design (DDD) is called “bounded contexts”. The integration of each SCS into the overall application happens in most cases within the browser via links and transclusion. These systems don’t share a common UI code nor common business logic. Each system may be maintained by a separate team using their very own preferred technologies.


Major Telcos Join Facebook's Open Hardware Push

It's also about innovating faster. Gagan Puranik, director of SDN/NFV architecture planning at Verizon, said the OCP's collaborative model should help Verizon get new technologies into production more quickly, including future advances like 5G. He expects Verizon to buy equipment from "a mix of traditional and non-traditional" suppliers, he said. Facebook has already developed a pair of powerful OCP switches for cloud and enterprise use, and the new telco equipment could add to the pressure on traditional vendors. Those companies aren't standing still. Nokia, which just bought Alcatel-Lucent, was among the new OCP members announced on Wednesday, and says it will incorporate OCP designs into future telco products.


The Mindful Board

Mindfulness in the boardroom refers to the capacity of a group of people to think in a deep way together. In assessing a current challenge, the mindful board looks to the past, present, and future. Deliberations encompass the impact of a decision not only on the enterprise, but on industry, society, and the planet. And the board considers how the decision will play out in both the short term and the very long term. Mindful boards intentionally look out at the world through multiple windows — technology, politics, sociology, environment, and economics. To leverage the power of using multiple windows, members of the mindful board hone their individual capabilities while practicing three interdependent disciplines as a governing body: leadership by the group, expanded consciousness, and fearless engagement.




Quote for the day:

"Technology has the shelf life of a banana." -- Scott McNealy


January 26, 2016

Is Persistent Storage Good For Containers?

Despite this conventional wisdom, there persists (pun intended) a desire to bring persistent storage to containers. The reasons for this varies. In some cases, an application needs data to persist and its performance requirements can not be met through backends like objects stores or network file systems; typically, this is a SQL database like MySQL or Postgres that isn’t designed to scale out in the way a NoSQL database might. In other cases, a company that is moving to containers and cloud-native apps may have a desire to leverage existing technology when possible, such as a storage array.


Save the ransom: How being prepared and proactive foils the plot

Having good solid, working backups is one of the most important choices that one can make. Maintaining more than one backup plan both offline and offsite, is crucial. Always check backups and test-restore on a regular basis—valid, working backups are part and parcel of the proactive process. Since ransomware targets and encrypts visible files—including mapped network drives and network shares—utilizing an offline backup strategy ensures that your organization will not come to a grinding halt or have to cough up any bitcoins. Remember to always physically disconnect the hardware backup device from the network, after the backup is complete.


The Ten Commandments of Microservices

With the emergence of containers, the unit of deployment gradually started to shift from away from the VM models. Linux container technologies, such as LXC, Docker, runC and rkt, make it possible to run multiple containers within the same VM, allowing DevOps to package each app component or app module in a dedicated container. Each container has everything—from the OS to the runtime, framework and code—the component needs to run as a standalone unit. The composition of these containers can logically form an application. The focus of an application becomes orchestrating multiple containers to achieve the desired output.


Spear Phishing: Real Life Examples

A spear phishing case that involved the RSA security unit of data-storage giant EMC Corp shows how even a company known for security in the cyber realm can be target and victim of an attack. In 2011, RSA was attacked using a Flash object embedded in an Excel (.XLS) file that was attached to an e-mail with the subject line “2011 Recruitment Plan”. Small groups of employees were targeted, and the e-mail was filtered and landed in the users’ junk mail folder. Unfortunately, all it takes is for one person to fall victim of the scam. As explained by the RSA FraudAction Research Labs, regardless of the state-of-the-art perimeter and end-point security controls, security procedures and high-end technology used by a company,


Employee Off-Boarding: How to Keep your Data Safe During Employee Turnover

Companies should make it clear that all data on device is the property of the organization. We ran through some of the specifics behind remote wipe features in this blog, but as a refresher here’s more insight: Employees should have signed a policy disclosing that when e-mail is configured on a personal smartphone, tablet or computer, that if they leave without notice and take their devices, that the company will remote-wipe the device. This means that the employee will not only lose the e-mails on that device, but also all of their personal data on that device. You should encourage employees to be forthcoming about leaving your organization to avoid this issue and present personal devices to be wiped by your IT department without losing their personal data.


Diana Larsen on Agile Fluency Model

Maybe the most surprising thing that’s being added in terms of larger chunks is complex adaptive systems. One of the things that this model has taught back to us is how it actually reflects the foundations, the conditions, the underpinnings of complex adaptive systems–teams as complex adaptive systems. We’re adding information about how complex adaptive systems work when they are teams and when they manifest as a team. What you can look for to help that system flourish. More of that kind of understanding and material, that’s just fascinating to me. We had a tiny bit of that in the first edition. We’re going to have quite a bit more in the second. And we’ll have a couple of new stories. That will be fun.


The CISO's Role in Fighting Extortion

To mitigate risks to corporate data, organizations need to use network segmentation to "ensure that sensitive data is only available within the network to the parts of the network that actually need to be able to access that data," Miller says. They also should use air-gapping to help ensure that sensitive data is not accessible from the public Internet. "Of course there are many other steps that organizations can take to secure sensitive databases and other information as well. ... One of the hopeful measures that companies can take is ensuring that any employee who has a public-facing role and could be contacted by an extortionist is aware of what to do."


Testing the test: How reliable are risk model backtesting results?

This blog reveals that the distributional nature of the profit and loss (P&L) distribution being modelled can have a significant impact upon the previously known factors driving Type-II errors. ... Risk models are not expected to produce reliable and robust risk estimates 100% of the time. Indeed when specifying a model, users build-in expectations around its accuracy often defined by the number of breaches it produces (i.e. occasions whereby the P&L of a portfolio is greater than that predicted by the model). The Kupiec-POF test therefore attempts to assess model performance by comparing the amount of breaches a user would expect a model to produce with the actual amount it does.


Alleviate data wrangling pain points with visualization tools

"The tool presents a visual representation of the data," said Alon Bartur, Trifacta's principle product manager. "It makes certain assumptions concerning the structuring of this data, and the user sees these assumptions by indicators that assess what the likely quality level is of each piece of data. Users know immediately from the indicators whether the data that they are seeing is of high quality or whether it is questionable and might require additional investigation. The user interface is designed for point and click interactions and the system gives the users suggestions of how to organize data reports, as well as certain data transforms that the user can run and what the likely outcomes of these transforms are."


Does Anyone Really Want the govt Deciding Encryption Policy?

What is the best way to keep everyone safe from the various bad guys out there? In one limited sense, this shares an argument from the U.S. gun debates. Is it safer for an individual to have a gun or is it more likely that the bad guy would simply take that gun and use it against the citizen? In the encryption argument, the question is whether it's safer to let the government have full access or will that just make it easier for the bad guys to steal that full access?  Framed in that "which truly makes us safer" perspective, I think there are good arguments on both sides. But if that technology-oriented question is going to be answered by any individual, I'm somehow more comfortable with the Tim Cooks making that call than some politician. At least Tim Cook is honest about his motivation



Quote for the day:


"You have to think anyway, so why not think big?" -- Donald Trump


January 25, 2016

When Virtual Reality Meets Education

In what may turn out to be an immersive education game changer, Google launched its Pioneer Expeditions in September 2015. Under this program, thousands of schools around the world are getting — for one day — a kit containing everything a teacher needs to take their class on a virtual trip: Asus smartphones, a tablet for the teacher to direct the tour, a router that allows Expeditions to run without an Internet connection, a library of 100+ virtual trips ... This global distribution of VR content and access will undoubtedly influence a pedagogical shift as these new technologies allow a literature teacher in Chicago to “take” her students to Verona to look at the setting for Shakespeare’s Romeo and Juliet, or a teacher in the Bronx to “bring” her Ancient Civilizations class to the ancient Mayan ruins at Chichen Itza.


John D McGonagle: Welcome to a world of Internet of Things

In the future, a consumer will want their rights to extend to their machines, but traditional analysis of contractual offer and acceptance, and the existence of binding contracts, will become complicated where machines are automatically interacting. After all, it may not always be obvious or implied that a machine has authority to act on its owner’s behalf. Taking a more strategic view, IoT will undoubtedly lead to the proliferation of valuable technology. However, serious questions still remain. How will it be protected? Will it be patentable? IoT devices will also require cloud computing power to collect, store, analyse, search and deliver vast amounts of data.


Configuration as a Service

This is where Configuration as a service comes in – the ability to change the behavior of our software systems on the fly without the need to make code changes. Recently the squad I work in released Skyscanner’s first iteration of Configuration as a Service. Our main motivation behind the system was to enable anyone in the business to safely make changes to our production systems while having the changes backed by A/B tests and associated metrics & reporting. Another motivation was that the system allows us to gracefully bypass a service which is experiencing an unexpected problem. Having this flexibility means we can continue deliver the core experience which people come to Skyscanner for even if something goes wrong behind the scenes.


4 essentials to creating a world-class threat intelligence program

"Aim small, miss small" according to Gundert, applies equally well to threat intelligence — a subject that produces an immense amount of data. He explains, "True success in threat intelligence is predicated on constraining intelligence efforts to specific business objectives, which removes the large surface area and leaves only a challenging sliver of value to pursue." ... Besides using threat vendors as sources, in-house data gathering capabilities are important sources of company-specific information and a way to verify vendors. Gundert adds, "For example, building an internal Web crawler that analyzes the web page code of the business's top 5,000 daily web destinations may provide insight into drive-by attacks."


From Monolith to Multilith at ticketea

Three years ago ticketea was basically a monolith, an all-in-one solution that was designed this way due to some constraints and advantages at that time. Basic constraints were size of the team and money, and some of the advantages were reduced time to market for new features, deployments were easy, the infrastructure necessary to run all this was small and cheap and most members of the team at the time had a full picture of the platform. We basically had an API and a frontend web application, which is better than having all in one single web application. Having a separate API was already a big head start. In the beginning of 2013, we had to create a business intelligence solution that fit our needs and thus we created Odin, which was more like a Satellite to this monolith.


5 reasons why IoT needs data analytics

Businesses will need to use analytics to generate insights because, with the Internet of Things, the stakes have never been higher. Analytics has already been used in industries like retail and finance, but the Internet of Things promises to broaden its scope into other areas such as healthcare. ... Wearable devices are able to collect and send patient data to doctors in real-time and RFID sensors are helping provide greater confidence in the pharmaceutical supply chain. With more data becoming available all the time, medical IoT devices combined with analytics tools could be used in the future to not only identify health issues, but ultimately cure them.


Why Cloud Computing Will Shake Up Security

Traditionally, switching products have relied on elaborate routing protocols and network encapsulations to make sure that, for example, Rack A doesn’t talk to Rack B, but can talk to Rack C. It gets way more complicated in the jumble known as network management. But in cloud computing, the network management mess goes away. For example, Security Groups, the network controls Amazon uses that are defined up front and deployed automatically. This is a huge time saver because you no longer have to set up network access control policies and the need for software switches is greatly reduced.


Choose the right PaaS for developing cloud applications

The key factor in choosing the right PaaS type for developing cloud applications is understanding the project at hand, said Dave McCrory, CTO at Basho Technologies, maker of the Riak open source database. No one PaaS type fits all circumstances, and that may necessitate keeping several in a developer's toolkit simultaneously. "There are a large number of distinct PaaS types, because application development scenarios differ," McCrory said. Concurring with Hurwitz, he said one is the SaaS style, typified in the way that Force is tied to Salesforce. Heroku, he said, is different in that, "you upload everything you want to run, and put the apps online. It isn't bound to Salesforce as tightly as Force."


Healthcare IT's battle to keep sensitive data safe

Unlike the financial sector, security awareness in healthcare is lagging. Also unlike the financial sector—and much to the chagrin of the industry—hacked medical records command a premium on the black market because health data is far more permanent. Healthcare organizations are facing a cybersecurity crisis. ... Beyond patient data, pharmaceutical research information is a highly attractive target for cyberespionage. It takes an average of 12 years to research a drug and get it approved, typically costing the research company $359 million. Competing companies, often sponsored by nation-states, can be motivated to cut costs and time through the act of cybertheft.


The Imperative for Ethical Standards in Analytics

Other research and publications have also pointedly raised concerns and risks regarding the perils associated with breaches or questionable use of data. These concerns have risen all the way to the White House, where at a recent conference DJ Patil, the White House chief data scientist, emphasized, "My ask is that every training course, every curriculum, every MOOC, every college class, every professional degree, every program at a company has a data ethics curriculum that is intrinsic – not some bolt on, but intrinsic – to the training of every data scientist, every computer scientist, every data engineer, every data operations person."



Quote for the day:


"Technology made large populations possible; large populations now make technology indispensable." -- Joseph Wood Krutch