February 05, 2016

Container networking offers opportunity to simplify networks

In bare-metal and physical environments, container networking is similar to VMware networking -- with two deviations, according to Brandon Philips, CTO of CoreOS Inc., a container platform vendor. First, explains Philips, containers come and go more rapidly than VMs, so the network needs to be designed around this reality. Second, people are going to run many more containers than they would VMs, so the amount of address space that a container environment may consume is likely to be larger. ... By not needing its own operating system as part of an application image, a container application image can be smaller; meanwhile, the corresponding density of a container deployment can be higher than an environment based on VMs.


Automating Access Solves Many of Life’s Business Problems

You may not think much about when your employees need their password reset, but this is actually the single most common call that employees make to the helpdesk. Though this is an easy task, it is time consuming for both the helpdesk and the end user. In addition, this is a major problem for employees who work outside the times of the help desk. If an end user works nights, weekends or even in a different time zone and is locked out of an account, he is unable to contact the helpdesk to reset the password. This leaves the employee unable to access applications or system until the helpdesk receives and processes the request, leaving the employee unproductive.


Testing: Mind the DevOps Gap

DevOps projects tend to start in one part of the continuum from development to operations. There is nothing wrong with taking this approach. However, it is also important to “Mind the Gap” and work to expand automation across the continuum continuously. One way to ensure that automation can expand easily is to deploy sandbox technology across the continuum, beginning with development and continuing through configuration and release management. The sandbox ensures that at each step, the production configuration and workload is being replicated. Sandboxing technology has been used in development in the past, but is relatively new to the entire DevOps process. As more companies move to continuous integration and continuous deployment, however, the need for sandboxes is growing.


Digital Transformation Requires Total Organizational Commitment

By injecting new thinking into a company, employees can start to see that there are different ways to handle those standard business practices and can begin to incorporate that type of creative thinking into their organizational philosophy. When you consider that 88 percent of the Fortune 500 companies in 1955 are now gone, it’s not hard to see that change has always been with us, but the rate of change is accelerating dramatically due in large part to the disruption brought about by digital transformation. “The cool thing is that incumbents recognize that the same assets that can hold them back, can also be used to compete in a different guise,” Levie said. That means it’s not all gloom and doom, companies just have to start thinking much more creatively about their digital future and the effect that will have across the organization.


Cisco Bets Big On IoT With $1.4 B Jasper Buy

Jasper's focus has been on managing devices connected by cellular radios, which explains the company's relationships with mobile operators around the world. "We see cellular as an important, and increasingly more important, transport in IoT," said Trollope, noting that cellular connectivity has not previously been a focus for Cisco. Businesses, he said, tend to rely on cellular connectivity when tracking high-value assets like vehicle fleets. Similarly, security applications tend to include cellular connectivity because WiFi often isn't as reliable or available. Gillett sees Jasper's focus on cellular as a boon for security, because cellular networks are more controlled than the open Internet. "Jasper is not a security solution but security is part of its value proposition," he said.


Microsoft SDN stack to challenge Cisco, VMware

Even without a fully baked SDN stack, Microsoft is already on enterprises' radar. A global survey of companies and public cloud providers found that a "significant number" identified Microsoft as an SDN vendor, said Brad Casemore, an analyst at IDC.  ... "Microsoft will still need hardware partners for the network underlay, just as VMware has underlay partners for [SDN product] NSX," Casemore said. "But Microsoft will indeed be increasingly perceived as an SDN vendor within its installed base of customers." To date, industry experts have said Cisco and VMware are in the best position to bring SDN to many enterprises. Both vendors are leveraging successful product lines to sell their SDN frameworks. In Cisco's case, it's network switches, while VMware is tapping the many companies using its data center virtualization platform.


The Agility Challenge

When we talk about ‘Agile change’, many organisations could be said to be “Agile by accident”. In those places, Agile mindset, principles and practices have emerged at the team or the programme level, typically within IT. If it is the IT that continues to drive the Agile initiative on its own, then it will remain the only place where Agile will be in evidence. This will usually lead to a “clash of cultures” between the emerging collaboration culture within the delivery teams, and thecontrol culture dominant in the rest of the organisation. ... So, how do we get the ‘Business’ and ‘Management’ on-board and get them to recognise the opportunity of Agile? To start with, we should stop talking to them about Agile. Instead, we should discuss business outcomes and impacts. And we should explore delivery capability and the fact that there is always more of the stuff that we want to do than we can actually do.


SDN in Enterprise Moving Past the Hype, Survey Finds

SDN and NFV decouple the control plane and various networking tasks—including routing, firewalls, intrusion detection and prevention, and load balancing—from the underlying hardware and put them into software that can run on low-cost commodity systems, including switches and servers. The goal is to enable businesses to build networks that are easier to program, scale and manage, that are more agile and flexible, and that cost less than traditional infrastructures. Cost savings is a key driver, according to the survey. Fifty-three percent of respondents said it was a top benefit, followed by 47 percent who cited improved network performance, 46 percent who said increased productivity and 45 percent who said improved security.


How To Fix a Broken CRM Pipeline

a CRM’s contact and account information are valuable to management — but those pale in comparison to the value of deals that will (or won’t) make the quarter. If a CRM system helps win just one more deal every quarter, it more than pays for itself. Unfortunately, too many sales pipelines are just baloney: wishful thinking about deals that will never close (or, worse, that don’t exist at all). There’s also the opposite problem: Big deals that may well close, but don’t show up in the system at all until they do. These “miracle” deals are never harmless surprises, and can be downright dangerous if you have a long supply chain. The good news is that there are several metrics you can use to validate the pipeline health. But simple numbers need to be supplemented by policies, automation, and business processes that provide incentives for good behavior.


Android Marshmallow: The smart person's guide

Finally, Google has seen to it to allow end users to manage app permissions (without a third-party software). With this feature you can disable permissions for each app by feature such as Body sensors, Calendar, Camera, and Contacts ... Google Now On Tap takes this to a whole new level. When you're in an app screen and you long press the Home button, Google Now On Tap will present cards related to whatever you are viewing on the screen. This is an incredible breakthrough for those that want instant information about specific subjects. ... Device security is at a prime now. If you purchase a new device running Android Marshmallow, full disk encryption will be enabled by default. Devices upgraded to Marshmallow will have encryption disabled by default.



Quote for the day:


"Whatever you think the world is withholding from you, you are withholding from the world." -- Eckhart Tolle


February 04, 2016

World Quality Report 2015-2016

Based on analysis of five respondent groups: CIO, VP Application, IT Director, QA/Testing Manager and CDO/CMO, the report surveyed respondents from across the globe through quantitative interviews followed by qualitative deep-dive discussions. Key findings from this year’s report: The impact of IT quality on the end-user experience is a driving force for today’s digital transformation initiatives; QA and Testing budgets have increased 9% year-on-year; Enterprises are widely embracing agile and Development and Operations (DevOps) methodology; Shorter program and application lifecycles are creating increased demand for testing hardware and infrastructure.


The first Ubuntu tablet is a desktop too

Behind the scenes, Ubuntu's convergence is designed to help the ecosystem to grow. There's no point buying into a new ecosystem if there aren't any apps, but equally there's no incentive for developers to make those apps if nobody's buying the phones. This is a real hassle as developers have to build different versions of their apps for the iPhone, iPad and iMac or for different Android devices, but less of a problem for Ubuntu when they only need to build one app and it will work on any Ubuntu phone, tablet or computer. The M10 tablet has a 10.1-inch high-definition display. The screen is protected by Asahi Dragontrail glass, a rival to the tough Gorilla Glass used for the displays of devices including Samsung and HTC smartphones. It's 8.2mm thick and weighs 470 grams (16.6 ounces), feeling lightweight and easy to handle.


Best Agile Method For Your Team: Scrum Vs. Kanban

One of the key differences between scrum and kanban is that kanban places the project and its needs at the heart of the process. In scrum, the sprint and its time box is at the core. Kanban radically changes the way that projects are managed within the non-project environment of the organization, while scrum is more appropriate for organizations in which development is constant rather than episodic. So which is right for your team or company? It really depends on what problem you're trying to solve. Kanban is more linear; scrums are intensely multi-threaded. Kanban looks at agile from the project perspective. Scrum assumes that work on products and systems never ends.


Collaborative Overload

Any effort to increase your organization’s collaborative efficiency should start with an understanding of the existing supply and demand. Employee surveys, electronic communications tracking, and internal systems such as 360-degree feedback and CRM programs can provide valuable data on the volume, type, origin, and destination of requests, as can more in-depth network analyses and tools. For example, Do.com monitors calendars and provides daily and weekly reports to both individual employees and managers about time spent in meetings versus on solo work. The idea is to identify the people most at risk for collaborative overload.


Cybercrime Costs More Than You Think

Cybercrime has become big business. Instances of cybercrime cost the global economy about $450 billion annually. Beyond the monetary damages associated with the crime itself, an instance of cybercrime can severely damage a company's reputation, indirectly affecting the bottom line for years to come. In this paper, we explain how companies can mitigate the reputational risk associated with a cybercrime through internal and external communications practices. Our findings include: The median cost of cybercrime has increased by nearly 200 percent in the last five years and is likely to continue growing; The reputational risk associated with cybercrime extends well beyond monetary damages; and Having a plan in place for how to respond to a cyberattack could save millions.


Hackers claim to have hijacked NASA's Global Hawk drone; NASA says not true

The drone takeover allegedly occurred on April 9, 2015. The zine states, “After countless months of successfully retrieving NASA drone logs automatically, we noticed some weird traffic;” a single .gpx file was pushed out to Global Hawk each time it returned to base, indicating it had a “pre-planned route option” sent over WLAN. The group decided to do something “sinister,” using a man-in-the-middle attack to upload its own custom. gpx file to control the drone and “to crash the Global Hawk into the Pacific Ocean.” ... Shortly after the drone left its predetermined flight plan, NASA noticed and took manual control of the drone.


4 Things Employees Hate About IT (And How To Fix Them)

Chapleau's team used its PÜLS software, ... to find out what their biggest IT complaints were, and how businesses could address them to derive more value. The results were published in Green Elephant's IT User Satisfaction Annual Report. It turns out, getting back to basics is the key. ... "What we wanted to do was emphasize that, to bring greater business value from IT, you have to take user satisfaction and your users' needs into consideration, first and foremost. It's about trust and being able to meet basic user needs; if your users' basic needs aren't being met, they won't trust you to introduce new, cutting-edge and innovative technology, and they won't use it," Chapleau says. Here are the top four things users hate about IT, and how to fix them.


How AI and automation could hollow out the US job market

The argument that automation will worsen inequality is sometimes rejected on the grounds that business owners won't act against their own interests. The reasoning goes that if business owners impoverish their workers they undermine those workers' ability to buy goods and services from that business. However, Kopczuk says this argument is undercut by there being no simple mechanism for employers to collude to keep workers employed and well-paid in this way. "It's a very old argument. I think I would associate it with Henry Ford, 100 years ago. You pay your workers so that they can afford to buy your cars."


Cloud security culture a building block for today's businesses

"An analogy you might think of is a neighborhood block watch," Reavis said. "If you have everybody aware what's going on in the neighborhood, it can be a real strength and really augment the overall security posture of an organization." Lillie has a multilayered approach for cultivating a security culture. Part of it involves a "fleet of tools" --cloud access security brokers, software that protects cloud services; identity management tools; mobile device management; and laptop system protection, to name a few. But just as important as technology is bringing on security team leaders who can communicate the value of crafting and executing a security strategy, and can build relationships across the teams they're going to work with -- from applications to infrastructure to business departments.


CIO interview: Fergus Boyd, vice-president for digital, Yotel

Despite having several partners that help deliver the IT that underpins its operations, the global team delivering the technology and digital initiatives is composed of only four people, while the flagship New York hotel has its own team. The department will grow this year to aid work going into the new hotel openings. Boyd says the main challenge he faces as a leader in a fast-changing and highly competitive sector is to manage tight budgets, as well as retaining talent and developing good in-house expertise. “We have a very aggressive growth plan for the company, so keeping up with that and the pace of change of new technology will be key to success,” he says.



Quote for the day:


"The thing that makes you say, 'I want to do something' -- that is the beginning of talent." -- Stella Adler


February 03, 2016

Make IT Delightful, and Other Ways to Enchant Your Employees

Satisfaction means our basic needs are met. Happiness means our emotional needs are met. Enchantment gives us meaningful experiences we didn’t even know we needed. And what better way than that to keep employees fully engaged? Yes, smart companies still must invest in fair compensation, diversity, family-friendly HR policies, work-life integration, playful environments and activities, perks, and a more holistic notion of well-being, as well as nurturing a values-based, purpose-driven culture that motivates people to work together for a greater cause. But the next step is to enchant employees in the same way you do customers.


Operations Challenges for the SDDC

For operations, moving to an SDDC architecture has the potential of adding more work to their already full plate. Shifting from physical to virtualized systems requires them to change how they monitor, manage and maintain the new infrastructure to comply with company security and regulatory compliance policies. They also need to help security and GRC teams achieve their goals of keeping the functional IT teams in their swim lanes, such as the networking team, while working in the virtualized infrastructure. On top of all this, operations has to make sure that they meet the business SLAs and the requirements for system availability and scalability.


Network Professionals Take On Increasingly Strategic Role in the Enterprise

The expansion of cloud computing brings both challenges and benefits to the networking team. Seventy percent say cloud will add complexity, while at the same time nearly the same amount (69%) stated cloud will enable the networking team to play a more strategic role. Software-defined networking (SDN) continues to rank high among organizations' network and data center plans. Forty-eight percent of enterprise organizations are actively researching plans around SDN and nine percent are piloting SDN technology. It's clear that they plan to be farther down the adoption curve in the future as 22% plan to be piloting the technology a year from now.


Headhunter dismisses 'rock star CIOs,' extols corporate values

Not culture, mind you — values. “Culture is tribal. Culture is esprit de corps, the tenure of your daily interactions,” Banerji said. The same company can have many subcultures. Marketing has its culture, IT another, the New York office has a different culture from the Boston office. And that’s perfectly OK, he said. But cultural independence shouldn’t be mistaken for core corporate values. “Values transcend function, they transcend geographies and times zones and business lines. They are the irrefutable tenets companies put forward to define who they are,” he said. It could be the corporate philosophy revolves around integrity, or creativity, or putting the client first.


Adapt, disrupt, transform, disappear: The 2015 Chief Digital Officer Study

Because the CDO role is just a few years old, it is not yet possible to determine whether companies with CDOs perform better in the marketplace than others. Indeed, some companies are flourishing without a single executive overseeing their digital transformation at the highest level — though most of these companies are already quite far along in their digital journeys. We believe, however, that less advanced companies would clearly profit by hiring one top executive to develop and carry out a coherent digital strategy. The goal of this study is to better understand which kinds of companies are hiring CDOs, who these new executives are, and how they approach the tasks in front of them — and then to look at how, specifically, the CDOs at several very different companies are taking on the demands of digitization.


How Barclays is cashing in on big data & Hadoop to stay ahead in fintech

It is fairly obvious then that even the most prominent fintech firms would not yet have the capacity to do the all this, at the scale an institution like Barclays can. However, just three years ago, Barclays did not have the capacity either. Simon said that historically the firm would have had to use a huge Oracle database, and "to process across all our small business customers on a daily bases it's about six weeks work of processing data." Six weeks is hardly useful for a small business under daily pressure to survive and trying to grow. Things have changed now though, Simon explains, thanks to the increased processing speed, and reduced cost of a Hadoop stack.


You’ve Been Hacked: How to Recover From the Nightmare

What’s next when you discover a hack at your facility? Healthcare organizations typically have detailed technical plans for closing access to networks, assessing damage and doing post mortems so it doesn’t happen again. But more than the technical repair that needs to go, organizations also need to have a plan for appropriately responding to the reputational hit that can occur from a hack. It’s more than just a PR department’s “problem.” IT executives will need to be involved to manage the fallout and craft responses that limit the damage to the organization’s reputation. It’s easy to botch. When retailer Target suffered a large cyber attack, the company tried getting the word out quickly on the extent of the attack and what it was doing to mitigate the damage and protect customers.


EU, U.S. Data-Transfer Deal Will Never Work

Steve Hunt, an industry analyst with Hunt Business Intelligence, initially reacted to the news with sarcasm. “That announcement makes me smile. I am actually thrilled about it,” he said. “I finally have a way to protect corporate secrets from government surveillance.” His tongue-in-cheek plan was to throw all sensitive data into a server, label the folder “European personal information” and “they’ll have to bypass.” Hunt, turning serious, said that such an agreement “would require policy and oversight that extends far beyond traditional government reach” and added that it would be “so costly and difficult that it would be practically impossible. It’s a promise without any possible weight behind it.” One of the many problems with such a move is audit efforts, confirming compliance.


How business outcomes are transforming IT spending

According to the report, 70% of respondents said it's critical that they're able to link IT investments to tangible business outcomes. So, if an understanding of IT's impact is this important, do these organizations feel that they are communicating that clearly enough? Well...not necessarily. Only 47% said that their organizations are doing an excellent or very good job at communicating how a particular IT investment impacted a business outcome. The remaining 53% said their organization needs a least some, if not significant, improvement in doing so. Not only did respondents say that identifying the impact on the business was important, but 68% of them said that, when making an IT investment decision, the business goals were more important than any of IT's operational goals.


Why I No Longer Use MVC Frameworks

Does a component-based Angular2 look a lot simpler? Not quite. The core package of Angular 2alone has 180 semantics, and the entire framework comes close to a cool 500 semantics, and that’s, on top of HTML5 and CSS3. Who has time to learn and master that kind of framework to build a Web app? What happens when Angular3 comes around? After using React and seeing what was coming in Angular2, I felt depressed: these frameworks systematically force me to use the BFF “Screen Scraping” pattern where every server-side API matches the dataset of a screen, in and out. That’s when I had my “to hell with it” moment. I’ll just build a Web app without React, without Angular, no MVC framework whatsoever, to see if I could find a better articulation between the View and the underlying APIs.



Quote for the day:


"No matter how you're treated or unappreciated, make the conscious decision to start each day anew as the best version of you" -- Carson V Heady


February 02, 2016

How to prepare for the IT department of the future

"IT needs to do some marketing and consider users as they do consumers. Is IT delivering only 80 percent of a service without following through? Are they rude? Inefficient? You're providing IT services to your users, and so 'brand' is so important. If your users aren't seeing the value in your services, then the company as a whole isn't going to think that IT has any value," says Simon Chapleau, CEO of Green Elephant. To change that, IT will have to focus on measurement and accountability, Chapleau says. By measuring user satisfaction with IT, and allowing users to grade the services they're receiving, IT can focus on what needs improvement and, in the process, get more done.


Job One for the CDO: Lay Foundation for Data Management

Often working through a matrixed organization, CDOs can help overwhelmed IT teams put the right strategic focus on analytics. If they succeed, business managers at all levels can use higher volumes and varieties of structured, semi-structured and unstructured data to make better decisions about customers, competitors and operations. But how specifically does a CDO accomplish this? The answer varies widely based on the circumstances and maturity of the enterprise. Rarely does a CDO inherit a pretty situation. In their report, “Top Performers Appoint Chief Data Officers”, Forrester analysts Gene Leganza and Jennifer Belissent point out that negative events such as security breaches or disappointing results often prompt the appointment of a CDO to improve data governance or assess new market or customer dynamics. 


Network-attached storage: The smart person's guide

NAS products, as with SANs, are starting to evolve beyond just large boxes filled with hard drives. Most major NAS suppliers now offer all-flash and hybrid disk/flash products. Other modern twists on NAS include products that automatically replicate their data into cloud storage and, as discussed above, versions with advanced clustering that are essentially SANs behind a NAS head unit. Whether these are the "best of both worlds" remains to be seen. Another trend is software-defined NAS, which allows businesses to build their own systems using commodity hardware. There's some irony to this, as business-class storage companies spent years explaining how their proprietary NAS systems were much better than homegrown file servers using independent NAS software.


Are Retailers Improving Cybersecurity?

"We have been in business or incorporation for almost two years now," Engle says of the R-CISC. "We have seen significant growth. ... We're seeing that the retailers are really getting a clearer picture of risk to their organization, and it's not just in the payment transaction." The R-CISC now has more than 100 merchants as members, he points out. What's more, R-CISC's close relationship with Financial Services Information Sharing and Analysis Center is aimed at ensuring that those member merchants are able to collaborate and share threat intelligence directly with the banking community, Engle explains. "We work extremely closely with the FS-ISAC," he says. "We have chosen to utilize the same technology and information sharing platform ... and our ISAC function is actually located in the same building as the FS-ISAC."


Tablet shipments down, but detachables catch on

Detachables are growing fast because end users see them as laptop replacements, IDC analyst Jean Philippe Bouchard said in a statement. He said Apple sold more than 2 million iPad Pros, while Microsoft sold about 1.6 million Surface devices, of which most were the Surface Pro and not the more affordable Surface 3. "It's clear that price is not the most important feature considered, when buying a detachable — performance is," Bouchard said. After Apple, Samsung and Amazon in the top three positions for the fourth quarter in tablet shipments, Lenovo finished fourth and Huawei was fifth. There were 66 million tablets of all types shipped in the quarter, down nearly 14% from the fourth quarter of 2014.


A Short Manual to Bring Change Successfully into Your Team

This is the first question every leader should ask himself before starting this big adventure, because it often turns out to be a rocky and lonely road. Have a look at the WoMan in the mirror and ask yourself before initiating a process of personal changes in your team: are YOU ready for modifications in your own behavior and attitude? If the answer to this question is a clear YES, without any hesitation, then go on and step into this surprising road of change and discover what will happen to you and all the people around you! But if you need to think a little bit longer about the YES or if “Yes?” sounds like a question, you should review your reasoning, double-check your intentions and convince yourself.


Asean organizations braced for cyber attack

“You only need to watch the news or surf the Internet to see what the modern-day hacker is now capable of. Implementing proper security measures is no longer an option, it is a must,” said Somchai Intiraworanont, president of XanSiam International. To ensure that the company plugs all potential security holes, it hired security provider Network Box to upgrade its firewall service to a unified threat management service package. “DDOS attacks were a problem before we deployed Network Box in the data center,” Intiraworanont said. “Today, we have been noticing a lot of zero-day malware getting stopped in its tracks. There have also been a number of intrusion attempts blocked.”


Phishing Attacks Among Greatest Plague Facing Healthcare

Phishing is not just aimed at the largest healthcare organizations; a recent survey by the Healthcare Information Management and Systems Society found that 69 percent of respondents have experienced a phishing attack. Security incidents involving those from outside the organization (phishing and other types of attacks) caused significant problems for some of the organizations responding to the HIMSS survey. Of all respondents affected by a breach, 21 percent reported the loss of data, and a total of 16 percent reported either significant disruption or actual damage to their IT systems. Attacks at Anthem and Primera were frighteningly easy, according to the annual report on healthcare security breaches, by Bitglass, a security solutions vendor.


Defending a network from the NSA

Whitelisting is the opposite of anti-virus software. That is, rather than allowing all software to execute by default and trying to block bad stuff, white listing defaults to blocking everything and only lets known good applications run. Perhaps realizing that many in the audience felt that whitelisting was impractical, Joyce hinted at using it on servers. As a rule, servers run less software than the computers used by employees, and the software is updated less frequently, making it easier to maintain the whitelist. Another area where he suggested whitelisting was outgoing traffic. Companies often allow all outgoing requests by default and then try to block known bad domains. I got he feeling the considered this a fools errand.


The need for cyber security skills in Australia balloons

It’s not just end-user enterprises looking for security skills, either. The federal government is ramping up its cyber know-how with agencies such as the Australian Security Intelligence Organisation (ASIO) and ASIS hiring, according to Acheson, and the vendor community is looking for skills too. Like corporate Australia generally, vendors are looking for a blend of abilities. Sam Ghebranious, regional director for CyberArk in ANZ, said that while technical capability is important, so are the soft, communications skills and the ability to articulate the security challenge that enterprises face. “You need to be able to relate to change management and understand the security policies of the organisation,” he said, adding that 80% of the success of a security solution came from getting users to change behaviour and use the solution.



Quote for the day:


"The majority of our problems are of our own making." -- Gordon Tredgold


February 01, 2016

Data Governance: A Roadblock for Analytic Ambitions

The shift to shared saving and risk-based reimbursement has revealed the cracks in data governance and information management infrastructures at many organizations that are having significant problems getting the data pieces in place to keep their heads above water. Michael Hunt, M.D., chief population health officer at St. Vincent’s Health Partners, a 275-physician medical group in Bridgeport, Conn., cites research that shows 70 percent of accountable care organizations don’t make money. “The data set for the Medicare Shared Savings Program requires reporting for 27 different quality measures, and many of those ACOs apparently couldn’t submit the appropriate quality data,” Hunt says. 


VMware NSX: 3 different use cases

Mike Feld, the interim CTO at Baystate Health, said that there's more demanded of IT in healthcare, but less money going into it because of shrinking budgets. Traditionally, all the data center pieces are independent and their infrastructure is older. "We needed to make a complete change," Feld said. "We couldn't just tweak a particular vendor, or replace vendor A with vendor B. We needed to completely redo the way we do IT, and hyperconvergence [was] essential." And, the key component to that hyperconverge strategy was NSX. Feld said they looked at products from Microsoft, Cisco, and OpenStack, but they didn't have the deep level integration at the abstraction level, which is why they chose NSX.


DDoS is most common cyber attack on financial institutions

Many organisations do not include DDoS mitigation as part of their security strategy because they do not see DDoS attacks as a real security threat, but failure to have systems and procedures in place to mitigate such attacks could expose any organisation to significant financial losses, particularly those that depend on interacting with customers online. Imperva Incapsula sais DDoS is a serious matter affecting e-commerce sites and corporate and online assets. ... “DDoS attacks can last several days, so it is vital to have a plan in place to deal with such a threat,” said Verizon’s Dine. This includes having a well-tested response plan that details what to do if initial DDoS defences fail, he said.


Big data success needs a data-driven culture

A decade from now, thanks to innovations in fields like robotics, cryptocurrency and genomics, companies will experience huge changes to how they operate. Editorial Director Sue Troy sat down with Alec Ross, Hillary Clinton’s former innovation adviser, to delve into what these developments will mean for technology leaders. In part one of the Q&A, read about Ross’ predictions on blockchain technology and how this technology underlying Bitcoin will affect impact legal processes in the next five years. In part two of the interview, Ross talks about how cognitive robots will affect the labor market and how U.S. companies compete globally. IoT may be about to change the way we think of food safety.


Why Laws for Robots are Doomed to Failure

Robotics and AI haven't come anywhere close to being able to build robots that would be able to comprehend or abide by these or any other sophisticated rules. A robot vacuum cleaner doesn't need this level of moral complexity. "People think about Asimov's laws, but they were set up to point out how a simple ethical system doesn't work. If you read the short stories, every single one is about a failure, and they are totally impractical," said Dr. Joanna Bryson of the University of Bath. Bryson emphasises that robots and AI need to be considered as the latest set tools - extremely sophisticated tools, but no more than that. She argues that AI should be seen as a tool that extends human intelligence in the same way that writing did by allowing humans to take memory out of their heads and put it into a book.


Bring Your Own Smartwatch: Mobility Management Vendors Prepare

IT can also use settings that limit notifications and messages displayed on the Apple Watch. An iPhone managed under the AirWatch platform can also be restricted as to whether or not its user can even pair it with an Apple Watch, according to Zakai. Good Technology has a different approach, designed specifically for Apple Watch. The company has released "Good Work" for the device, which enables IT to configure the level of detail shown in watch notifications. For instance, IT can determine whether a user will be able to see an email's sender and subject line only, or whether they'll be allowed to view a full message on the Apple Watch. Good has also announced support for secure Android Wear app development on the Good Dynamics Secure Mobility Platform.


Microservices in the Real World

The key point is that an SCS should be responsible for its own UI as well as its own data store. The system’s boundaries exhibit a vertical split along what in Domain Driven Design (DDD) is called “bounded contexts”. The integration of each SCS into the overall application happens in most cases within the browser via links and transclusion. These systems don’t share a common UI code nor common business logic. Each system may be maintained by a separate team using their very own preferred technologies. When done right, end users will fluently move between systems, crossing application borders simply by clicking links or hitting buttons – ideally without even noticing that they left one system and entered another.


Microsoft Tests Underwater Data Center

"Project Natick reflects Microsoft’s ongoing quest for cloud datacenter solutions that offer rapid provisioning, lower costs, high responsiveness, and are more environmentally sustainable," the company said. Using undersea data centers helps because they can serve the about 50 percent of people who live within 200 kilometers from the ocean. Microsoft said in an FAQ that deployment in deepwater offers "ready access to cooling, renewable power sources, and a controlled environment." Moreover, a data center can be deployed from start to finish in 90 days. ... The company is also considering a "deployment cycle" of 5 years each, which is the anticipated lifespan of the computers in it. "After each 5-year deployment cycle, the datacenter would be retrieved, reloaded with new computers, and redeployed," according to the Microsoft FAQ.


Microsoft and mobile: The headache that won't go away

If that rate of decline keeps up, Microsoft's phone business will pretty soon be nothing more than a rounding error when it comes to revenue. Plenty of people are now writing their obituaries for Lumia. And it's certainly hard to see where Microsoft can go from here. One option is to keep Lumia (perhaps rebranded as Surface) going for the same reasons that Google has got Nexus - as a way of showing consumers and manufacturers the potential of the software. The trouble for Microsoft is that consumers aren't interested and neither are manufacturers any more. That doesn't mean the Microsoft can't build hardware: Surface continues to grow and Hood said that following the launch of the Surface Book and Surface Pro 4 the tablet-PC device is likely to see continued momentum and growth as Surface Book becomes available in more countries.


Why 10 million developers are lining up for the Internet of Things

Sure, there are plenty of developers working on wearables and smart home applications. But the developers getting paid in IoT are working on the dull-but-necessary industrial applications, as last year's Developer Economics report unearthed. Any company that hopes to attract the hobbyists that dominate consumer-facing IoT applications needs to make it as easy as possible to get productive, which is why Google and Apple have been voted most likely to succeed. Regardless, as VisionMobile's latest report highlights: "Developer interest shouldn't be taken for granted, and hype alone cannot sustain developer involvement. For example, the amount of IoT developers targeting wearables dropped from 28% to 21% in 6 months' time."



Quote for the day:


"If you get bored with social media it's because you are trying to get more value than you create." -- @FastCompany


January 30, 2016

Cybersecurity report recommends test-hacking medical devices before and after release

White hat hackers are essentially the “good guys” of the industry. They are generally hackers or programmers that make their living through ethical means, specializing in computer and software security. They don’t always work with a particular company — sometimes they are the lone-wolf type. The important point is they don’t hack into systems or devices with the intent of causing harm. Instead, their goal is to find vulnerabilities and holes which may need to be patched in order to improve security. After finding a security flaw, they often provide the necessary documentation and aid to the system owner or admin to improve security.


Testing Tips For Today

Test scenarios aren't always one-way. They aren't always request-response. They aren't always server-pushed. Applications that employ WebSockets often contain a mix of communication patterns. To build your load test scenarios you'll want to record and playback WebSocket communications with your app to create realistic testing scenarios. You'll also need to handle messages pushed over WebSockets just like you would handle messages pushed using a traditional request-response, piggy-back architecture. Load test variables should include the time it takes to establish a WebSocket connection, as well as the time it takes to send a request over that connection. Finally don't forget to include tests for both text and binary data.


Great Little Inventions: Velcro

It is often said that one of the main qualities of geniuses is seeing what no one else sees. Undoubtedly, many people before De Mestral had walked through the countryside just to end up with spikes and thorns pinned to their clothes, yet for most people it was just a minor nuisance. In contrast, when in 1941 the Swiss engineer returned from a hunting trip through the mountain forests of Jura, he envisioned a solution where others could only see a problem. After plucking seeds from his clothes and from his dog’s hair, he came up with the idea of studying them under a microscope in order to understand how they managed to snag so stubbornly.


Finding Unexpected Allies Pt 1: Risk Management

Now, this seems like it’s too good to be true and the obvious question that most people will be asking is, “what’s the catch?” The catch that I’ve experienced is that you can’t simply email a bunch of business units in the bank and say “please list the business services you provide and the applications that support them”. The first problem with doing so is, what is an application? And what is a business service? Without a decent definition, the level of granularity that you might get, and the type of operation that gets identified, will be all over the map. You need to engage with each group to define concepts, so that you ensure some level of consistency.


The next 5 years: possible trends in business software

The growing popularity of platforms with big data capabilities means that more business software programs will likely emphasize real time data analysis in the future, also. This trend emerges in particular in the conduct of successful social media campaigns. The mining of consumer data now extends to a wide array of integrated social media platforms; coupled with sophisticated database technology platforms, this capacity enables companies to develop programs that respond more flexibly and in a far more tailored manner to individual customers. Eli Stutz in “The Future of BPM: 7 Predictions” argues that real time processes will give a fourth dimensional quality to some popular software programs used by businesses.


How healthcare systems can become digital-health leaders

High-quality, sustainable healthcare depends on IT-enabled services and a digital platform, but healthcare systems are still unclear on where to focus investment, what technologies provide the greatest benefits for patients and healthcare providers, and the return on investment. In 2014, we did considerable research into the economic value of digital technologies in healthcare and found that implementing technologies such as patient self-services, using digital channels rather than direct physician interaction, or patient self-management solutions can produce net economic benefits of 7 to 11 percent of total healthcare spending. Over this past year, our work on the ground has confirmed this original analysis.


Best practice advice for moving to the cloud

"For most organisations, moving to the cloud involves a shift in finances, because you're moving from a well-understood capital expenditure model to an operating cost-based model. That scares people sometimes." Hewertson says IT leaders must take time to explain that, while operational costs will rise, the long-term effects of depreciation will be lower as the business avoids a hit every few years when it needs to upgrade its infrastructure. To ensure everyone understands the potential risks and benefits, Hewertson has established a corporate risk board, which highlights the potential risks of the current operation at a formal level. Hewertson advises his CIO peers to use a similar approach to receive the broad support of senior executives and to help alleviate risk, particularly at an individual level.


The Neurologist Who Hacked His Brain—And Almost Lost His Mind

Kennedy called his invention the neurotrophic electrode. Soon after he came up with it, he quit his academic post at Georgia Tech and started up a biotech company called Neural Signals. In 1996, after years of animal testing, Neural Signals received approval from the FDA to implant Kennedy’s cone electrodes in human patients, as a possible lifeline for people who had no other way to move or speak. And in 1998, Kennedy and his medical collaborator, Emory University neurosurgeon Roy Bakay, took on the patient who would make them scientific celebrities.


IT governance: why does it matter?

With increasing regulatory requirements, both auditors and IT managers are adopting CobiT as the compliance framework for IT controls. The CobiT IT Process model has helped convey a view of IT that is understandable to business management, auditors and IT, while providing a basis for IT functions to be organised more effectively into a process structure with accountable process owners. The roles of IT and audit for IT governance are separate yet intertwined. IT professionals often have a poor understanding of what controls are and why they are needed. Audit can help with this by working together with IT, providing training that facilitates a change in the culture of the IT organisation and adopting a focus on controls.


Building Security In versus Building Security On

‘Building Security In’ means that security must be built into the developer culture. Developers should understand that security is now part of their job. This is accomplished by building security into their incentives, providing them the training they require, and showing them that security is a valued skill to the organization. There should be a well-defined software security group with equally well-defined policies and tools to measure efficacy. A common pushback from developers is that security can decrease productivity. There are tools that will in fact do the exact opposite, demonstrating an increase in productivity by as much as 15 percent. These tools live in the developer’s environment and scan code as it is being created.



Quote for the day:


"Winning means you're willing to go longer, work harder, and give more than anyone else." -- Vince Lombardi


January 29, 2016

Growing the IoT: Chaos vs. Curation

It’s already happening, since many of the consumer IoT offerings center on, well, a center. You install a "brain" that all of the intelligent elements in your home connect with and through. It makes decisions and also has the primary connection with the cloud. The individual devices aren't doing everything among and by themselves. And in commercial, industrial and governmental areas, it's fairly obvious that pure peer-to-peer device communications without any curation won’t cut it -- something, or someone, needs to act as curator to ensure that things are handled well and properly, rules are applied and rights are respected. The Napster vs. iTunes example parallels this perfectly, and we are facing similar issues with the IoT.


What's Next? 2016 Priorities For High-Performing CIOs

In the new year, many CIOs may find themselves at a critical juncture. They can either build themselves into successful business leaders or they can risk being relegated to second tier “care and maintenance” roles in which they will provide technology support for the strategies and goals of others. Based upon hundreds of conversations we’ve had with CIOs over the past 12 months, it is clear which path high-performing IT leaders will take in 2016. We predict CIOs will take the following steps, among others, to distinguish themselves as strategists and decision makers as they proceed down the leadership path:


EU May Be Aiming to Block U.S. Tech Companies, Schumer Says

Negotiators from the U.S. and the European Union are racing to meet a Jan. 31 deadline to find a replacement for the Safe Harbor agreement that permits user data from companies like Facebook Inc. to be transferred to the U.S. The Safe Harbor pact was struck down last year by the EU’s highest court. "I am worried that the Europeans are using -- that their real motivation is to keep our companies out because they’re so superior to the European companies," Schumer, the likely successor to Senate Democratic Leader Harry Reid, said in an interview Wednesday. His comments come ahead of a Thursday meeting of the Senate Judiciary Committee, where Schumer has a seat. The panel is scheduled to address a bill, H.R. 1428, that would grant European citizens the same data privacy protections as U.S. citizens.


Address IoT security risks before it is too late, urges report

“In the next few years our lives will be surrounded by devices connected to the internet that will digitalise every step we take, convert our daily activities into information, distribute any interaction throughout the network and interact with us according to this information. “Never before has what we do in our physical lives been closer to the digital world. It is precisely the blurring of the line between the digital world and the real world that represents the changes introduced by the IoT. “The future of IoT is unwritten, but only through collaboration and insight can we achieve a secure foundation.” The report was developed by Telefónica’s cyber security and IoT divisions in association with a range of partner organisations operating in the field of cyber security.


A Reference Architecture for the Internet of Things

In the IoT world we don’t only define the goal on the user level (i.e. by application), but things themselves can work towards certain goals without actively including the user. In the end the devices still serve the user but they act autonomously in the background – which is exactly the idea of ubiquitous computing. In order to get a better picture of the term “context” we will first introduce our context model and then jump into the introduction of our reference architecture. Context defines the state of an environment (usually the user’s environment) in a certain place at a certain time. The context model usually distinguishes between context elements and context situation. Context elements define specific context, usually on the device level.


Building a solid cloud governance model for 2016

A final consideration when building a cloud governance model is compliance. This is closely coupled with information security, but there are additional considerations. In particular, watch for details regarding users' responsibility when using a cloud service that is in compliance with a particular regulation. For example, AWS cloud services are PCI compliant, but users of those services must contract with PCI auditors to complete other requirements. Similarly, several, but not all, AWS services are suitable for use with protected healthcare data under the Health Insurance Portability and Accountability Act regulations. Governance strategies should prevent the use of noncompliant services, and ensure compliant services are not used in noncompliant ways.


The need for cyber security skills in Australia balloons

“Yes, they are hard to find, and if you go to an industry and bring a security expert from there, those people have been aligned in a particular areas and are focused on that area only. The best source is the big four management consultant organisations because they invest in people, technology and the soft skills set.” It’s not just end-user enterprises looking for security skills, either. The federal government is ramping up its cyber know-how with agencies such as the Australian Security Intelligence Organisation (ASIO) and ASIS hiring, according to Acheson, and the vendor community is looking for skills too. Like corporate Australia generally, vendors are looking for a blend of abilities.


How To Protect Security Product Investments

The larger the enterprise, the more likely it is that it has many, many security tools. Staff might not learn, use, or update any number of these, perhaps either because there is something off-putting about the technology (some kind of complexity, for example) or because it is one more task on top of an already overwhelming pile. When these tools stay connected and running on the network in a misconfigured, outdated fashion, they become vulnerabilities for attacker entry and liabilities for the enterprise. Security products can come with native remote access capabilities. When enterprises use such products and leave remote access open with default or easily guessed credentials, this turns a security advantage the enterprise should leverage into a security vulnerability.


One crucial exercise for a healthy business

Many organizations, such as technology firms, that have been in this industry for years have the capacity and vision to adjust to financial downturns -- meaning strategic plans and budgets are modified periodically. Depending on their customer base or their global reach, businesses have to assure investors that they can meet market and consumer expectations. ... Conducting effective planning routinely includes an operational budget and a scorecard that aligns with the long-term business plan. With this data in hand, leadership should also have a documented analysis of the business strengths, weaknesses, opportunities and threats that govern how well the company is functioning.


Teach your team to embrace change and create an Agile mindset

Leaders must remember that people are emotionally attached to the way they work -- it is a large part of their lives -- and if they have a lot of experience in the "old" way of doing things, they will be even more emotionally attached to it. Therefore, cognitive arguments with a collection of facts about Agile, or any new idea, aren't necessarily persuasive. What is more persuasive is finding ways to help people care about those facts -- by having conversations that uncover how people are truly feeling about the new idea. Be ready -- these feelings may not necessarily be rational -- but this will allow the leader to truly address what is standing in the way of making Agile, or any new idea, happen.



Quote for the day:


"Be brave. Take risks. Nothing can substitute experience." -- Paulo Coelho


January 28, 2016

Oracle is Planning to Kill The Java Browser Plug-in

"Oracle does not plan to provide additional browser-specific plugins as such plugins would require application developers to write browser-specific applets for each browser they wish to support," the company said in a white paper that outlines migration options for developers. "Moreover, without a cross-browser API, Oracle would only be able to offer a subset of the required functionality, different from one browser to the next, impacting both application developers and users." The main alternative proposed by the company is to switch from Java Applets to Java Web Start applications. This type of application can be launched from the Web without the need for a browser plug-in.


Local Governments Need Governance and Training Amid IT Security Risks

Government agencies approach risk management in different ways, and some may have more mature approaches than others. Additionally, governments need to deal with the fact that residents increasingly expect “24/7 access to government information and services, on mobile devices, without regard for how government develops, manages and pays for that access and those services.” The report says that local governments need to become “technologically proficient” in order to “identify, assess and manage technology risks.” There are four different ways that local governments can achieve this goal, the report notes.


As Cloud Services Mature, Three Key Lessons Learned

As for the integration challenge, 61% indicated that it remains a major pain. In fact, a quarter of the respondents said that at least one cloud application project was abandoned due to the inability to link enterprise data to the cloud applications. While I expect that proportion to decline over time, due to improved tools and smarter implementation teams, it will remain a challenge. An important corollary to the need to integrate external cloud apps to internal on premises data is the fact that we now have a two-way challenge. The rise of XaaS means that many organizations now have valuable data in the cloud that needs to be accessed by their on-premises systems.


The Basics of Web Application Security

Security is a cross-functional concern a bit like Performance. And a bit unlike Performance. Like Performance, our business owners often know they need Security, but aren’t always sure how to quantify it. Unlike Performance, they often don’t know “secure enough” when they see it. So how can a developer work in a world of vague security requirements and unknown threats? Advocating for defining those requirements and identifying those threats is a worthy exercise, but one that takes time and therefore money. Much of the time developers will operate in absence of specific security requirements and while their organization grapples with finding ways to introduce security concerns into the requirements intake processes, they will still build systems and write code.


Hadoop and Big Data: The Top 6 Questions Answered

You will certainly need some folks with Hadoop skills, database/data management skills, system admin skills, programing skills and analytics skills. Currently, the market isn’t oversaturated with Hadoop admins that possess all of these skills along with several deployments and a few years of management experience under their belts ... As for the data scientist, they’re great if you can find one (and afford him/her). You’re talking about someone who gets statistics, algorithms, coding, data and database technologies and the underlying business logic. In many cases, companies are leveraging the skills of multiple individuals already on staff as opposed to hiring a dedicated data scientist.


Unikernels – The shiny new object in the cloud

Unikernels take the concept of minimalistic operating systems to the next level. It is a specialized OS which is compiled exclusively for the program that runs on it. So, a developer can create an extremely compact executable that not only has his code but even the operating system. Unikernels are single-user, single-process, single-purpose, specialized operating systems that strip away unwanted functionality at the compile time resulting in a stand-alone, self-contained unit. The new unit of deployment contains the entire software stack of system libraries, language runtime, and application, compiled into a single bootable VM image that runs directly on a standard hypervisor.


13 Frameworks For Mastering Machine Learning

Over the past year, machine learning has gone mainstream in an unprecedented way. The trend isn't fueled by cheap cloud environments and ever more powerful GPU hardware alone; it’s also the explosion of frameworks now available for machine learning. All are open source, but even more important is how they are being designed to abstract away the hardest parts of machine learning, and make its techniques available to a broad class of developers. Here’s a baker's dozen machine learning frameworks, either freshly minted or newly revised within the past year.


The clearest sign yet that Microsoft is cool again

Despite a booming R&D budget, the research done within Microsoft's labs rarely got productized, as I've written before. Or, as Ahmad Abdulkader, an engineer on Facebook's applied machine learning team, and formerly of Microsoft and Google, told Bloomberg, "Microsoft totally separated its research arm from the rest of the company and almost made it optional to contribute to the rest of the company. Google took the exact opposite approach." This sometimes left Microsoft scrambling to catch up with innovations released elsewhere. Under CEO Satya Nadella, Microsoft's R&D team is actively engaging with product teams to ensure all those R&D billions contribute to tens of billions in sales. But, this isn't the clearest sign of Microsoft's rebirth.


Bimodal IT Strategies and Their Impact on Data Governance

Unfortunately, this dual infrastructure approach rests on several false premises. The first is that startup DevOps teams are all using open source software, and that this is what enables agile application development. The reality is far different. Most startup DevOps teams use a lot of paid software and services out of necessity because they don’t have the time or resources to customize and tie together a bunch of open source applications to meet their IT infrastructure needs. If they did spend the time building this infrastructure themselves they would never get their businesses off the ground. Drawing on scores of on staff engineers and deep pockets, only the biggest of the big tech companies are building IT infrastructures that are based on open source and their own custom-built software.

Managers’ 3 Mental Blocks to Strategic Planning

The typical solution is to spend a lot of the corporate strategy team’s time and money on streamlining the strategic planning process and clarifying the accompanying instructions. This does make a difference, but strategists will be much more likely to help managers consider the long-term – and so help the firm make good long-term decisions – if they spend less time on planning process and more on counteracting executives’ operational mindsets. CEB data show that this is six times more successful in terms of improving long-term thinking during the strategic planning process.



Quote for the day:


"Whenever an individual or a business decides that success has been attained, progress stops." -- Thomas J. Watson


January 27, 2016

Cyberwarfare in 2016: The Virtual Battle for Your Information

Regardless of how closely the treaty is followed by either country, it’s clear to the world that this is a unique issue that deserves special attention. Your main concern shouldn’t be corporate espionage as such; attacks on corporations are your biggest danger should cyberconflict arise in any capacity. Chances are that you or an immediate family member works for one. In the rare event that isn’t the case, you absolutely trust your personal data to one or do regular business with one so they have your financial information. Cyberconflict between any organizations large enough can result in corporations being caught in the crossfire.


Windows 10 at six months: Ready for primetime?

One of the most controversial design features in Windows 10 is its new update model, which removes the ability of consumers to control which updates get installed. Businesses have more knobs and levers, thanks to the November 2015 addition of Windows Update for Business, but those tools are made for IT pros and are either invisible or frighteningly complex for less sophisticated users. Still, this is a vision of where the future of computing has to be, and there really is no pain-free path. Asking users, even technically sophisticated ones, to make individual trust decisions over dozens of updates per month is ludicrous. The result, historically, is predictable: many users succumb to information overload or bad advice by disabling updates completely.


The real reason Microsoft open sourced .NET

.NET itself is changing, as the recent name change for the open source version (from .NET Core 5 and ASP.NET 5 to .NET Core 1.0 and ASP.NET Core 1.0), underlines. .NET Core doesn’t cover as much as the full .NET 4.6 framework. The same goes for ASP.NET 4.6 and 5 (which has the Web API but not SignalR, VB or F# support yet). The newer versions don’t completely replace the current versions, although they’ll get the missing pieces in the future. They’re also built in a new way, with faster releases and more emphasis on moving forward than on avoiding breaking changes. That’s the same shift you’re seeing across Microsoft. Over the last decade, building Azure has taught the company a lot about the advantages of microservices for what would otherwise be large, monolithic applications.


Wear your world

If you’re one of those who constantly complain about clothes bought online not fitting right, technology is here to help. LikeAGlove makes leggings that measure the shape of the wearer and provide the details in an accompanying app, which helps users filter out clothes that would not fit right. Workout freaks get to invest in shorts that track running statistics and Radiate makes T-shirts that glow to display the muscle groups that you just used in that last set. Scientists are also working on clothing that can maintain temperature according to the ambient conditions, using everything from pockets of liquid and air to studying how squids modify the wavelengths of light they reflect.


Service-oriented business: Maritz transforms IT culture

Learning was a key part of the Maritz IT overhaul. Paubel said Maritz's IT personnel received training on soft skills, sales and marketing. That process began at the highest level within IT. "We trained the management first," Paubel said, noting that the objective was to help the top IT managers understand what the new IT organization would look like. ... As the cultural shift continued, the Maritz IT group changed its values. The department reworked the management templates that define how employees earn merit increases and promotions. Employees are no longer rated on how many projects they complete, or how many tickets they close, but on how customers perceive them.


Microsoft Open Sources Deep Learning, AI Toolkit On GitHub

Microsoft attributes the surge in interest to the growing number of researchers running machine learning algorithms supported by deep neural networks -- systems modelled on the processes in human brain. Microsoft says that many researchers believe such systems can enhance artificial intelligence applications. The rapid improvements over the past few years in the speech recognition capabilities of applications like Apple's Siri and Google Translate, and in the image recognition capabilities of Google Photos, suggest that belief is well-founded. As mobile and Internet-connected devices proliferate, AI can be expected to become even more important as a way to facilitate function without traditional keyboard-based interaction.


Creating Your Enterprise Cloud Connectivity Strategy

The goal is to create optimal business agility, where the business can adjust or scale according to market demand. Enterprise cloud connectivity uses a variety of secure (and fast) connection protocols to allow organizations to integrate with network, storage, compute, and even user environments. The biggest difference has been the ease of creating these connections and how they can help transform a business. In the past, these connections were made manually and required a lot of administration. Today, major providers are offering easier ways to integrate with their cloud resources.


Microservices in the Real World

Self-Contained Systems (SCS) describe an architectural approach to build software systems, e.g. to split monoliths into multiple functionally separated, yet largely autonomous web applications. The key point is that an SCS should be responsible for its own UI as well as its own data store. The system’s boundaries exhibit a vertical split along what in Domain Driven Design (DDD) is called “bounded contexts”. The integration of each SCS into the overall application happens in most cases within the browser via links and transclusion. These systems don’t share a common UI code nor common business logic. Each system may be maintained by a separate team using their very own preferred technologies.


Major Telcos Join Facebook's Open Hardware Push

It's also about innovating faster. Gagan Puranik, director of SDN/NFV architecture planning at Verizon, said the OCP's collaborative model should help Verizon get new technologies into production more quickly, including future advances like 5G. He expects Verizon to buy equipment from "a mix of traditional and non-traditional" suppliers, he said. Facebook has already developed a pair of powerful OCP switches for cloud and enterprise use, and the new telco equipment could add to the pressure on traditional vendors. Those companies aren't standing still. Nokia, which just bought Alcatel-Lucent, was among the new OCP members announced on Wednesday, and says it will incorporate OCP designs into future telco products.


The Mindful Board

Mindfulness in the boardroom refers to the capacity of a group of people to think in a deep way together. In assessing a current challenge, the mindful board looks to the past, present, and future. Deliberations encompass the impact of a decision not only on the enterprise, but on industry, society, and the planet. And the board considers how the decision will play out in both the short term and the very long term. Mindful boards intentionally look out at the world through multiple windows — technology, politics, sociology, environment, and economics. To leverage the power of using multiple windows, members of the mindful board hone their individual capabilities while practicing three interdependent disciplines as a governing body: leadership by the group, expanded consciousness, and fearless engagement.




Quote for the day:

"Technology has the shelf life of a banana." -- Scott McNealy