February 13, 2016

Graph API in a Large Scale Environment

REST doesn’t provide any guidelines for how authentication for the API should be done. You can use basic HTTP authentication, OAuth2 or even your own custom developed authentication method. However, most of the APIs support the OAuth2 authentication method. In addition, REST doesn’t define the format of the represented data. It can be JSON, XML or even plain HTML. A few years ago, XML was very popular and most of the REST APIs used this format to represent the transferred data. Although XML has many benefits it is more complicated compared to JSON and companies started providing JSON as an alternative. We chose REST as the architecture, OAuth2 for authentication and JSON as the resource format. 


How these communist-era Apple II clones helped shape central Europe's IT sector

"Very often, it's said the products have been copied from Western companies. That's not exactly so," Boyanov writes in his paper, History of Bulgarian Computing. He explained that the goal of Bulgarian computer makers was to create products that "had to operate in the same functional way" as the Western ones. Rather than call them copies, a better term would be "analog" machines, he says. "Sometimes the parameters of our similar products were better than the Western goods," Boyanov says. Bulgarian engineers were able to correct some of the known shortcomings of the original products, he argues.


To save the iPad, Apple needs to copy Microsoft

The iPad was nice and exciting while it was new, but it never became an essential. Now compare this to the Microsoft Surface. Here is a device that excites me, and not just because of the hardware (though I have to admit that the hardware is nice). What excites me the most about the Surface is its ability to run a full operating system, which in turn gives me the freedom and flexibility to run full applications such as Adobe Photoshop or Microsoft Office, as opposed to the watered-down versions available from the app store. At the same time, it gives me the option to run cut-down apps from the Windows app store if that's what I want. It's easy to disregard Microsoft in the hardware space, especially given its dismal performance in the smartphone market.


How smart is Big Data?

In their rush to create a Big Data strategy, many companies are overlooking their existing data and not laying down the foundations that will enable the integration of all their data. Yet, this existing data is business critical data. The best analysis comes from the best data. Being able cross reference business critical data (structured or unstructured) with Big Data will deliver far more comprehensive results than Big Data alone. What companies need to consider is how to integrate Big Data with business critical data and to consider how they will integrate All the Data as early on as possible. The integration of data from all sources and all sets, is what companies need to do, to reveal the fuller picture. All the Data is this combination and integration.


Why open source can save companies from drowning in the data lake

By applying methodologies like design thinking and agile development, businesses can ensure that they focus on the right problems and develop highly viable and feasible solutions. The best way to analyse the gathered information is to build a custom analytics solution, designed to deliver the insights required. While a bespoke platform has historically required significant time and financial investment, the use of open source technology is changing the analytics landscape. Open source big data platforms offer incredible capabilities to build not only insights solutions, but also forecasting and providing predictive analytics solutions through mathematical and statistical models that have the ability to crunch through large volumes of data.


Open Source DCIM Software Project Combats Spreadsheet-Based Data Center Management

The project’s number-one goal is to take away “the excuse for anybody to ever track their data center inventory using a spreadsheet or word processing document again,” according to its website. There’s a misconception in the industry that DCIM is only necessary for companies that own and operate their data centers. In Milliken’s opinion, there’s a lot of value to using DCIM even if you’re only monitoring a single cage in a colocation facility. As more and more data center capacity is outsourced to colocation providers, it’s going to become more and more important for colo customers to be able to manage that capacity intelligently. Colo providers increasingly provide DCIM capabilities to their customers as a service, but not all of them do.


CSA: IT Perception of Cloud Services Has Increased

So how has perception about the importance of cloud services changed over the past several years? In the past, business owners accustomed to utilizing legacy storage and in-house services struggled to see the benefits of cloud computing, especially in light of recent high-profile data leaks and controversy as to the effectiveness of remote solutions. Like any new technology, cloud services were strange and different from the norm, causing those adverse to change to shy away from their use for fear of exposing sensitive information. But in recent years, cloud has become increasingly more prevalent in both consumer and enterprise use, and in doing so has demonstrated its worth as a replacement for both physical storage and traditional data center services.


7 Android tools that can help your personal security

For most Android users, the seven tools below should cover all the important bases of device and data security. Some are third-party apps, while others are native parts of the Android operating system. They all, however, will protect your personal info in meaningful ways -- and without compromising your phone's performance. Plus, all but two of them are free. ... Android's Smart Lock feature gives you the best of both worlds by cutting down on the annoyance factor while still allowing you to keep your phone secured when it really counts. You can choose to have your phone remain unlocked whenever you're in a trusted location, like your home, or anytime you're connected to a trusted Bluetooth device, like a smartwatch that's always on your arm or a stereo that's inside your car.


What Developers Want From Their Technology (But Mostly Cloud)

What’s more, developers too are also equally influenced by peers and trendiness, and the sexiness of the user experience and API, and sometimes even the prettiness of the GUI when it comes to adopting the latest tooling (remember a world before Docker?!). However, from a developer’s perspective the API is the key interaction point, and is largely the UI equivalent of an average user for judging the user experience of a new tool. This new world order dictates that if before the focus in product releases has been on core functionality and UIs, at the expense of the API’s usability - a major transgression by many software companies, that today the API is likely the most important element that will be the measure of your product’s adoption.


Ranchers guard their livestock via the Internet of Things

Cattle-Watch will incorporate Telefónica’s Smart m2m, a platform for managing IoT communications. Ranchers can observe their livestock and receive all relevant information via smartphones or other connected devices. Bulls are fitted with solar-powered collars which act as communications hubs and calves have ear tags that send status information to the collar hubs via a Bluetooth network every 30 seconds. The bull collars send back information to ranchers via cellular or satellite networks. Decisions can then be made based on the information gathered, for example withdrawing inefficient bulls or increasing the number of bulls.



Quote for the day:


"A leader is a person who knows how to act when other people don’t.” -- Eraldo Banovac


February 11, 2016

Why personal networks are tomorrow's internet of things

The other issue is that all of these IoT devices, for the most part, use public cloud services as their main integration point. They don't actually communicate with each other per se, they all go out through your router and talk to a cloud service where your data is stored, using web protocols and RESTful APIs. In the future, this problem is going to have to be solved. Unlike today's IoT devices which are fully cloud dependent, the Personal Area Network will be in essence your own hybrid cloud. Today we like to think of hybrid clouds as things cutting-edge enterprises have -- they have certain systems that run on-premises and some workloads that are bursted to public and private cloud hosted infrastructure.


Metadata-Driven Design: Creating an User-Friendly Enterprise DSL

If you’re unfamiliar with the ideas behind a DSL, I recommend viewing Martin Fowler’s dissertation3, where he describes DSLs as “limited forms of computer language designed for a specific class of problems”. In the seminal lecture, Mr. Fowler describes how XML configuration data can be utilized as a simple DSL for Java programs and frameworks. (Of course, this method of utilizing XML can now be found in various Java frameworks of today, with Spring and Struts being just two examples.) In doing so, he mentions several advantages to using such a DSL, including the lack of requiring recompilation for many cases and its approachable usability for normal business users.


Which Security Products Do Enterprises Expect Too Much From?

Companies should consider combining AI-enabled (artificially intelligent) security products such as Scorpion Computer Services’ ScenGen (other intelligent security products include examples from Lancope and AlientVault) with products that establish exhaustive baselines such as Scorpion Computer Services’ Normalizer (other baseline security products include Magna from LightCyber). Adding these into the mix with other effective products, perhaps replacing similar products that don’t measure up should sharpen an organization’s edge against intruders, helping it to better test for vulnerabilities and flag behavioral inconsistencies.


Violate Patient Data Safety At Your Peril, Warns Judge

An OCR investigation found that Lincare employees, who provide healthcare services in patients’ homes, regularly removed patient information from the company’s offices. “Further evidence indicated that the organization had an unwritten policy requiring certain employees to store protected health information in their own vehicles for extended periods of time,” the agency reported. “Although aware of the complaint and OCR’s investigation, Lincare subsequently took only minimal action to correct its policies and procedures and strengthen safeguards to ensure compliance with the HIPAA rules.” OCR reported that Lincare denied violating HIPAA, contending that patients’ protected health information was “stolen” by the individual who found the records in the home.


Put data scientists' skills to excellent use in mission-critical scenarios

you must be very selective about the actual data scientists that you assign to these roles. The reason why you don't automatically relate data scientists to high-pressure, operational roles is because you assume analytic-minded people don't function well in these roles. And you are correct. The stereotypical analytic does not like pressure. They need time to think and analyze, and they don't want someone hovering over them for answers. I was recently working with an analytic to move through some analysis, and we were running out of time. I gently nudged her by saying, "We only have 10 minutes left," and she quickly retorted, "Don't do that! Countdowns freak me out!" This is very typical.


​The best desktop office suite, LibreOffice, gets better

Besides its support for Open Document Format (ODF) 1.2, LibreOffice 5.1 also boasts improved compatibility with Microsoft's Office Open XML (OOXML) format, Microsoft Office's default file format. Technically, Microsoft's OOXML format is an ISO standard. Technically. In practice, no version of Microsoft Office, including Office 2016 has ever used the "strict" version of the standard. Instead, Office saves documents using a "transitional" version of OOXML by default. As the Document Foundation's Italo Vignoli points out, this is a transition that's been going on nine years. The Document Foundation says this standard tends to change with each new release of Microsoft Office, often in big ways, making it a challenge for LibreOffice to keep up.


APIs Are the Connectors Between Your Company and the Outside World

Perfect is dangerous word, but there is definitely API design that is a “good fit” for your needs. The trick is that not everyone needs the same solution. So not everyone needs the same API design. One of the things we talk about a lot in Academy events is the process of focusing on the problem, digging up details, and then solving the problem you have on hand. Instead of just showing up saying something like “You should use a REST API or a Hypermedia API or a Reactive API” you should really spend time working through the problem from several of points of view. That leads you to the best fit for your current needs. Of course, a year or so from now, your needs might change and then you get to do some more digging and designing and implementing. The work of creating APIs is never done.


Is 2016 the year of mobility technology?

Businesses that truly want to exploit the potential for these mobile trends and reach end users in new, lucrative ways will have to think in big and bold terms if they are to differentiate themselves from their competition. To get ahead, organisations need to think carefully about how they push innovation boundaries and future-proof their mobile strategies. What’s also clear is that innovation comes in all shapes and sizes, and in many different forms. A wise CIO or CTO learns to seek best practice from many different sources, adopting and adapting as they go. ... When users are travelling, Google understands where people are and can provide relevant, personalised information, such as the local weather and advice on what to do, direct to devices.


SD-WAN: What It Is And Why You'll Use It One Day

This ease of deployment, central manageability and reduced costs make SD-WAN an attractive option for many businesses. At VMworld 2015 29% of 260 attendees surveyed by Riverbed were exploring SD-WAN while 5% had adopted it. That compares to 77% who were exploring SDN, with 13% who had deployed it. Lerner says leading adopters of SD-WAN have been retailers and financial institutions that have a large number of branch offices. So if SD-WAN is so great why isn’t it more ubiquitous? Many organizations have custom built ASICs controlling their WANs and LANs, which have long refresh cycles. Network engineers are traditionally averse to dramatic changes too, Lerner says. When the hardware is ready for an upgrade Lerner expects organizations will consider SD-WANs, but that could be a multi-year process.


The CMO is not replacing the CIO and here’s why

The transformational CIO, unlike the traditional CIO, is in high-demand. In many cases, organizations do not understand what this means or what a transformational CIO looks like let along what they are capable of. A transformational CIO, unlike traditional CIO, is far more aligned with the business of the company. They are in-tune with how the company makes and spends money. They also look for opportunities around customer engagement and business growth. Transformational CIOs are more about business and data than they are about technology. In many ways, the transformational CIO is a business leader (first) that happens to have responsibility for IT.




Quote for the day:


"The world's appetite for data is increasing and with this comes a greater need for organizations to support cloud workloads." -- Nevil Knupp


February 10, 2016

London Mayoral candidates go head-to-head on technology policy

Both Khan and Pidgeon said they would establish superfast broadband as a core utility, something no one in the capital should be without, but the Liberal Democrate candidate pointed out that office space “is a bigger challenge than broadband speed”. She said the government’s “relaxation of rules” which allow developers to convert commercial property into residential use without planning permission, “needs to stop”. Goldsmith said that rolling out broadband can be “achieved relatively easy” and suggested partnering with the private sector to use Transport for London’s (TfL's) existing network to turn it into a “superfast broadband network.


Intel report puts spotlight on diversity at work

While the diversity statistics may not be cause for huge celebration, tech experts are hailing Intel's level of commitment and transparency as a possible game changer in the hiring practices at tech companies. Intel is the only tech giant to have publicly set quantifiable diversity, hiring or retention goals, according to NPR. "There's nothing here [that's] top secret or should not be shared with the rest of the world, in my mind," said CEO Brian Krzanich, who added that he hopes this transparency will spur competing technology companies to follow suit in order to prove their commitment to diversity. Claire Hough, VP of Engineering at Udemy, believes Intel's transparency to be an important step toward solving the larger problem of diversity at work.


What Managers Should Know About Data Privacy and the ‘Internet of Things’

Any business leader worth his or her salt is looking at how to gain a competitive advantage with IoT. The challenge, says Giulio Coraggio, a privacy attorney at DLA Piper Italy, is “how to ensure privacy protection in a manner that does not impair business profitability, which requires the need to get access to large databases of personal data.” In terms of risk, the IoT means the number of access points where personal information could be compromised will grow exponentially. The IoT can also, unwittingly, increase the risk of unlawful surveillance: Hello Barbie is a case in point. A hacker, potentially, could break into the ToyTalk cloud and listen to a kid’s conversation with the doll.


Cloud Computing Emerging as a Panacea for every Business Qualm

Cloud computing has been and continues to be adopted by enterprises across industries in many different ways. It represents a fantastic opportunity for technology companies to help customers simplify IT. Cloud has been seeing a lot of demand across sectors. Industries like telecom, BFSI, retail, education, healthcare and government are increasingly turning to the cloud to simplify IT. The demand for public cloud has recently shown an increase in the mobile and broadband sectors; pharmacy, manufacturing, e-commerce, retail and travel were the early adopters of public cloud. These include both the SMBs as well as larger enterprises.


How Pioneering Banks Adopt Hadoop for Enterprise Data Management

Simply put, bank IT budgets can no longer cover the same spending on specialized hardware and hosting and services. Regulatory pressures that mandate additional risk and compliance costs only compound these pressures. These regulatory forces include Basel Committee guidelines on risk data reporting and aggregation (RDA), The Dodd-Frank Act, the Volcker Rule, and regulatory capital adequacy legislation such asComprehensive Capital Analysis and Review (CCAR). These regulatory pressures force an urgent retooling of existing data architectures. These forces are transforming Risk and Compliance from a set of “check box” activities into a unique and compelling opportunity for competitive advantage.


Minimally Invasive “Stentrode” Shows Potential as Neural Interface for Brain

The catheter is inserted into a blood vessel in the neck. Researchers then use real-time imaging to guide the stentrode to a precise location in the brain, where the stentrode then expands and attaches to the walls of the blood vessel to read the activity of nearby neurons. The stentrode technology leverages well-established techniques from the field of endovascular surgery, which uses blood vessels as portals for accessing deep structures while greatly reducing trauma associated with open surgery. Endovascular techniques are routinely used for surgical repair of damaged blood vessels and for installation of devices such as stents and stimulation electrodes for cardiac pacemakers.


Where does Apple go after the iPhone?

"We believe 10 years from now Generation Z will find reality inefficient," Munster went on to write. "Generation Z will see the benefits of mixed reality headsets that augment the world with real-time information as they need it and in their field of view, without needing to look at one piece of information at a time on a smartphone." This might all seem rather far-fetched, but how would we have reacted to a prediction made, say, in 2000, that smartphones would be as huge - not to mention hugely influential - as they are now? We'd have probably thought that was far-fetched, but here we are, a little more than 15 years on, pretty much every one of us with a smartphone.


IT Automation In The Wild

“The automation angle is key to rapid delivery, and it lends a high level of quality and predictability to our development process and products,” Yochem says.  Interestingly, Yochem describes IT automation as an IT-driven strategy, the opposite of the view expressed by Maras.  “This is an IT-driven strategy, with the desired outcome being to deliver differentiating, high quality products to our clients. We are fortune at BDP in that our broader business community understands the value of business and IT automation, and have been supportive as we’ve adopted DevOps practices as part of our broader Agile methodology for product delivery,” Yochem concludes.


Flash memory's density surpasses hard drives for first time

The highest areal density for today's HDD products is about 1.3Tbpsi, according to Coughlin. Most HDD products, however, are well below that. For example, Seagate's desktop hard drives have a maximum areal density of 850Gbpsi; those drives use shingled magnetic recording (SMR), which overlaps the magnetic tracks for greater density. While still best-case laboratory figures, the NAND flash areal densities shown at the ISSCC are not far behind what is shipping today. Major SSD makers, such as Samsung,have announced what would be industry-leading 15TB 2.5-in solid-state drives (SSDs) are already on the horizon.


CISA is the beginning of a very long cybersecurity fight

The groundwork laid by laws like the Cybersecurity Information Sharing Act and standards in NIST’s cybersecurity framework have served to put the nation on a solid cybersecurity footing, but it will take much more effort if public and private sector are to deter the rise of data breaches and cyber attacks.  “The level of awareness has risen, but its not where it needs to be. If you really step back and assess the threats, this goes to everything — almost every piece of equipment, every car, every refrigerator, clocks, every tool we use, let alone our computers and networks and electric grid,” said Secretary of Commerce Penny Pritzker.  “The challenge is to make sure that we step up our game," she added, "We’ve got to collaborate.”



Quote for the day:


"The unfortunate truth is that securing internet-enabled devices is not always a high priority among vendors and manufacturers." -- Alex Chiu


February 09, 2016

Regarding Big Data, One Manager’s “Resistance” Is Another Manager’s “Caution”

After all, Turck suggests, big data is characterized by situations involving vast quantities of rapidly expanding data volumes; we puny humans can’t be expected to lasso meaning from all this without some help from AI-based minions. A lot of this makes sense when looked at from an “early adopter/late adopter” perspective. Data intensive “digital native” companies (e.g., Google, Amazon, etc.) have been in the forefront because they’re already data-centric. Less “resistance” means faster adoption by them, right? While I have to defer to Turck on the basis of his understanding of the technological landscape, a lot of this discussion has a very familiar ring to it.


9 Technologies That Could Cut Demand For Lawers

Lawyers are embracing technology that makes them more efficient and less trapped in 100-hour work weeks but that also reduces the need for them in certain types of cases or turns their counsel into a commodity. These technologies and services include a Web platform that searches patents more quickly than lawyers can, an app to find flaws in contracts, low-cost access to ask legal questions and an arbitration network to keep from having to hire legal representation to go to small-claims court. Attorneys from across the country heard about these at the recent LegalTech conference where some of the attendees indicated that the innovations could save money for law firms and even change their hiring practices by cutting the need for full-timers.


How Technology Is Helping the Blind Navigate the Physical World

Some technological developments are convenient for the rest of us but godsends to visually impaired people: Amazon reduces store visits. Uber provides transportation. Audible allows access to a selection of books and articles that vastly outstrips the audio and Braille sections of even a big city library. Most importantly, the next generation of assistive technology should change visually impaired people’s relationship with information, according to Asakawa. Personal technology allows data to be poured into the minds of the sighted, without realization or effort, through devices that have become as taken-for-granted as fingers and toes. But visually impaired people “always have to be active very active to get information,” she says. “It never just comes to us.” And the blind never take a walk just to clear their minds, says Asakawa. It takes a lot of mental energy just to get around.


How Testability Can Help Teams to Go Faster

Agile testing is testing in an agile context. The testing doesn’t change when we adopt agile, but the context changes. Some of the differences in agile testing are that by using an iterative approach the lead time for preparing, executing and reporting tests becomes shorter and that change will be a common thing. Also there is a change in roles, Schoots mentioned that as a test manager using agile he became more of a coach and was doing less testing. Rapid testing is a mind-set and a skill-set of testing said Schoots. With rapid testing there will be less documents and the focus on how to do testing increases. Rapid testing is a general testing methodology, not only for agile but suitable for any kind of project or product. Testing is about people working together in conditions of uncertainty. We can’t know everything and things will change.


IT Audits and Data Governance: What You Need to Know

By educating all IT staff members on the importance of compliance frameworks, a company can improve its audits and better, they can actually reduce risk by having everyone in IT on board to counter the dynamic threats we are all exposed to every day. The IT department can and should play a key role in responding to IT audits, audits that are there to assure the company meets this minimum standard that is the foundation for security.  One excellent framework to learn is the NIST Cyber Security framework. This particular NIST framework is the result of executive order 13636,”Improving Critical Infrastructure Cybersecurity” issued by the President of the United States. This was of course in response to the many data breaches that are hurting our country and its economy.


Seven tips to tap into Word's AutoText power

Word's AutoText feature lets you store text and graphics to insert later. Any content you include regularly is an AutoText candidate. Once you create the entry, you can insert the entire element instead of retyping it. AutoText is similar to AutoCorrect, which replaces commonly misspelled words automatically. But AutoText goes beyond the AutoCorrect feature by storing formatting, line breaks, and even graphics. It's AutoCorrect, but more. Although AutoText can make you more productive, many users don't know about it. In this article, I'll show you how to create and insert an AutoText entry. Then, I'll show you several ways to use this feature that you might not think of yourself. I'm using Office 2016 on a Windows 10 64-bit system, but these tips will work with Word 2003 and later.


Easing DevOps culture shock

Getting there requires you to target specific outcomes. While those outcomes should include soft goals like “better alignment with the business,” be sure to include hard outcomes, such as target metrics around defects, deployment frequency, and deployment-to-production success rates.  And don’t miss the importance of speed over cost. ...  “There are a whole bunch of very different techniques we use in order to optimize for speed, including the use of small, cross-functional teams that can independently deploy value to the customer without having to rely on hundreds, or even thousands, of other people,” Kim says. “When you optimize for speed, you’re willing to do all sorts of things—cultivate internal talent, pay engineers better and send them to conferences—that you would not necessarily do if you were optimizing for cost.”


US Government Wants to Sharply Increase Spending on Cybersecurity

"We have a broad surface area of old, outdated technology that's hard to secure, expensive to operate and, on top of all that, the skill sets needed to maintain those systems are disappearing rather rapidly," Tony Scott, the U.S. chief information security officer, said during the briefing. The fund requires approval from the U.S. Congress. Much of the plan could be initiated using the president's executive authority, Daniel said, but the administration plans to work closely with Congress. "This plan really is as aggressive as we can get under existing authority, and we can do quite a bit of it without the additional resources," he said.


Using Business Analytics to Make the Most of Data in 2016

Organizations need to use data and information technology better to streamline analytics. Our research suggests that they will need to invest in data preparation for analytics, as three out of five (62%) participants identified accessing and preparing data as a challenge in their predictive analytics process. The same percentage (62%) cited accessing and integrating data as a main reason for dissatisfaction with their analytic processes. Organizations can address some of these challenges in gaining access to information by virtualizing data. We also will follow the progress of organizations in using cloud-based technologies to help streamline their analytics;



Quote for the day:


"Adaptability is about the powerful difference between adapting to cope and adapting to win." -- Max McKeown


February 08, 2016

Amazon competes with other book publishers for authors. What other publishers can offer that Amazon cannot is coveted placement in physical bookstores. Those tables you see in a bookstore when you first enter are hot properties in the world of book marketing. And Amazon can't compete with that, until it gets its own bookstores. Physical bookstores will help Amazon attract bigger-name authors. One of Amazon's secrets to customer service is that it accepts returns, no questions asked. Physical bookstores would make it easy for people to return products. They could also serve as "outlet" stores to sell returned merchandise, saving Amazon millions. One of Amazon's big advantages is that it has so many credit cards in its system. The knowledge that Amazon already has your payment and delivery details means you don't have to enter all that information into a new site.


Big data's big role in humanitarian aid

"Can big data give us peace? I think the short answer is we're starting to explore that. We're at the very early stages, where there are shining examples of little things here and there. But we're on that road," says Kalev H. Leetaru, creator of the GDELT Project, or the Global Database of Events, Language and Tone, which describes itself as a comprehensive "database of human society." The topic is gaining traction. A 2013 report, "New Technology and the Prevention of Violence and Conflict,"from the International Peace Institute, highlights uses of telecommunications technology, including data, in several crisis situations around the world. The report emphasizes the potential these technologies hold in helping to ease tensions and address problems.


Why Cloud Computing Will Shake Up Security

The good news is these are essentially the same types of services that analyze data traffic for malware, but designed for the cloud. It still won’t be easy; there are some technical hurdles, like figuring out how the anti-malware solution gets inserted into a cloud system to which it doesn’t necessarily have access. Still, I think the top-shelf anti-malware vendors will be hugely motivated to attack this problem with gusto, and will figure it out. Of course, Amazon and other cloud providers will continue to enhance their security, but dealing with the many and evolving strains of malware is not their core competency. Instead, I think they will be more inclined to work with, or at least make it easier for, established security vendors to deploy their solutions onto cloud platforms. Expect to see more APIs and frameworks from cloud providers that allow for more seamless integration of third-party anti-malware.


All Your Data Belongs To Us – Data Security in a Global Infrastructure

Security analysts are seldom invited to initial software project meetings. No documented protection requirements for sensitive data are usually present at the meetings, nor how to identify data that is sensitive. Thus data security does not influence data architectural decisions. Basic data architectural decisions are usually completed prior to a full data analysis, which is assumed to be a business analysis. A security analysis would be a data analysis that characterizes the sensitivity of the data for privacy, legal and contractual protections, customer and supplier non-disclosure agreements, trade secrets, and personal private data of customers and employees. Do you do this during project planning? Even if data sensitivity is brought up, there is often no corporate standard to indicate this sensitivity in the Enterprise Data Model.


Built in: From myth to reality

Security practitioners should create a map of their respective value chains. Only after we understand the “who, what and where” of our enterprises' value chains can we take the next step: putting in place a flexible and adaptable architecture to begin the journey of making security “built in.” Is your map complete? Do you know what organization in your enterprise owns the relationship with your distribution channel?  Once you have a map, establish what threats should be part of the mindset of your value chain members. Manipulation, disruption and espionage in the IT value chain is an essential place to start.  Next, establish foundational requirements that can be applied across the product lifecycle, from design to decommission. The key driving those requirements is collaborative partnerships with your value chain partners.


AR and VR: The future of work and play?

Virtual reality is all about convincing the brain that a computer-generated 3D environment delivered to your eyes via a headset is 'real' -- a concept known as 'presence' in VR circles. Anything that doesn't look 'right' to our visual system may deliver a sub-par experience, or even cause dizziness, disorientation, nausea and headaches. This is less of a problem with AR, because you can still see the real world. ... According to the report's author Matthew Duke-Woolley, a lot of potential enterprise AR adopters are currently playing their cards close to the chest: "They don't really want to publicise what they're finding, because it's a cut-throat business -- in logistics, for example, the margins are quite tight, so if you can get a 10 or 15 percent cost advantage in your process, you stand a really good chance of beating the opposition."


What to love about your IT security job

Security practices may not top the “what I love about my job” list for the everyday employee, but for those working in the InfoSec industry, it’s a different story. Between the thrill of building systems to protect data and keeping up with an ever-changing landscape, IT security professionals face new challenges daily and are never finished with their to-do lists. Whether it’s building new technologies or advancing security skill sets, these InfoSec professionals share what they love most about their jobs. ... Every day is different, every client is different, and the evolution of the hack changes every week. While we are dealing with the same premise of protecting assets and data, the threats are evolving, adapting to defenses, and can be innovative to meet the objectives of the hacker.


Feature Toggles

Feature toggles are a powerful technique, allowing teams to modify system behavior without changing code. They fall into various usage categories, and it's important to take that categorization into account when implementing and managing toggles. Toggles introduce complexity. We can keep that complexity in check by using smart toggle implementation practices and appropriate tools to manage our toggle configuration, but we should also aim to constrain the number of toggles in our system. ... "Feature Toggling" is a set of patterns which can help a team to deliver new functionality to users rapidly but safely. In this article on Feature Toggling we'll start off with a short story showing some typical scenarios where Feature Toggles are helpful.


What are containers and microservices?

Containers have been integral to Unix and Linux for years. A recent change has been the ease with which they can be used by all developers, and an entire supporting ecosystem has grown up around them. Containerisation is not something happening on the fringes of IT, it is core to the way many web-scale services operate and is increasingly being adopted by more conservative organisations. The suppliers mentioned in this article cite customers ranging from the NHS to large banks. There are many suppliers involved, but no one disputes that Docker has led the charge and sits at the heart of the market. Docker says millions of developers and tens of thousands of organisations are now using its technology. However, another statistic indicates the novelty of containerisation for many, with only 40% of Docker’s customers running containers in production.


A call for more cloud computing transparency

Although Gartner calls some cloud revenue reporting nuanced, I'd call it hiding the hardware. Companies that have a mix of cloud flavors and traditional infrastructure should break them out. There's no crime in hosting data centers, managed services and converged private cloud building blocks. Cloud revenue should be broken out by product groups and various flavors. Not all cloud revenue is created equal. Does this type of transparency matter? Gartner argues that revenue claims shouldn't matter more than strategic fit. However, revenue does indicate scale. Scale indicates the ability to lower infrastructure costs over time. My take: Revenue claims matter and the debate revolves around degree.



Quote for the day:


"Do just once what others say you can't do, and you will never pay attention to their limitations again." -- James R. Cook


February 07, 2016

Enterprise Architecture Planning 2.0

Unfortunately, at most companies, EAP, or EA, was placed under the information technology function. It was often directed toward addressing narrow technology needs for particular business units, or subsumed into complex exercises in documenting incompatible systems. Then, as EAP was combined with reengineering during the 1990s, it was frequently used as an excuse for wholesale cost cutting, which ultimately tended to make companies weaker. This history helps explain why many EAP groups developed a poor reputation, or did not deliver value to the enterprise. Today, companies can proceed in a more strategic way — with something close to EA in scope, but more ambitious in spirit and pragmatic in achieving results.


Success in CIO position increasingly tied to business expertise

The first year, CIOs put together a plan; the second year, they execute on that plan; and the third year, "things don't turn out quite the way you'd like them to," said Langer, director of the Center for Technology Management and academic director of the executive Masters of Science Program atColumbia University. Then, they're gone. What sets apart the CIOs who don't fit this pattern? Langer described 23 characteristics in his recent webinar, Strategic IT: The Transition Taking Place in the CIO Role. The material was based on research and interviews that he and his colleague Lyle Yorks conducted for their similarly named book.


What does the future of driverless cars look like?

“A lot of people talk about automation being adopted at the kind of usual pace of safety systems, which is a kind of 20 year adoption curve,” Reed says. “I think it's going to be different. “Use cases like driverless shuttles in cities could happen quite quickly. Similarly automated driving by cars and platoons of trucks on motorways.” While some companies are looking towards pods and new ownership models, others are focusing on more traditional cars gaining increasing levels of automation over a longer timeline. Reed predicts the two models will co-exist, with adoption rates being different for each. “Adoption of fully automated vehicles will take longer due to the associated technical and regulatory challenges.” He predicts that although the technology will be a premium technology at first, it will trickle down to lower value vehicles and gain rapid adoption once practical.


A Business Outcome Driven Enterprise Architecture Approach

“Focusing on a standard EA framework doesn’t work,” he said. “In the past EA practicioners focused on deliverables that were useful to enterprise architects but not valuable to senior management and/or did not respond to a specific business IT need. “We’ve witnessed a change in mind-set, execution and delivery of EA. The value of EA is not in simply ‘doing EA’, but rather in how it can help evolve the business and enable senior executives to respond to business threats and opportunities,” (for more on responding to threats and opportunities, the Agile way see here). Brian Burke’s statements are echoed across the industry. Enterprise Architecture has got to become more about business outcomes and the deliverables that steer an organization toward them.


5 Cloud Computing Predictions for 2016

It’s obvious that enterprises will retain on-premises infrastructure for the foreseeable future. Given the use of public cloud computing there is, ipso facto, hybrid computing. The key question: How much infrastructure will remain on-premises and in what form? One vision proffered for hybrid cloud is an on-premises cloud environment based on, say, OpenStack, which interoperates with a similar public environment. Another vision proffered is an on-premises cloud environment interoperating with a dissimilar public environment. Yet a third is an unchanged on-premises environment, say a vSphere cluster, along with use of some public environment. Depending upon what form of hybrid cloud one envisions, the appropriate solution varies widely. And the question of what will emerge as the dominant form of hybrid cloud emerges victorious will dictate the fortunes of both users and vendors in the future.


The Internet of Emotions: Putting the person back into personalization

“When we talk about affective devices today, we’re really looking at primary emotions and that’s what we think is going to be responded to,” notes Wendell Wallach, acclaimed ethicist and scholar from Yale University's Interdisciplinary Center for Bioethics and author of, A Dangerous Master: How to Keep Technology from Slipping Beyond our Control. “But if you look at Paul Ekman’s charts, he’s got thousands of secondary ideas that represent subtler secondary states. As technology picks up on these subtle emotions it would avoid manipulating you in a very crude state one could filter out to manipulate you using those subtler cues.” Dr. Paul Ekman is the pioneer of micro-expressions, or "very brief facial expressions that occur when a person either deliberately or unconsciously conceals a feeling."


Why It’s Time To Switch To Big Data-Backed Business Decisions

Never before in the history of mankind, such a huge number of people are leaving their digital footprints. They are sharing, purchasing and surfing, searching and reviewing—and all of this is documented. You may analyze or may discard this humongous amount of data, but it certainly has a meaning. They give a clue to something that you don’t know. Companies having a foresight understand its importance. There are businesses, on the other hand, believe it more a hype. But sooner or later they will have to adopt it as this is an inevitability since technology has arrived. Human subjectivity is not going to be eliminated soon, but BIG data will be a major tool for the crucial marketing and business decisions.


Compact Strings Optimization in OpenJDK 9

UseCompressedStrings feature was rather conservative: while distinguishing between char[] and byte[] case, and trying to compress the char[] into byte[] on String construction, it done most String operations on char[], which required to unpack the String. Therefore, it benefited only a special type of workloads, where most strings are compressible (so compression does not go to waste), and only a limited amount of known String operations are performed on them (so no unpacking is needed). In great many workloads, enabling -XX:+UseCompressedStrings was a pessimization ... implementation was basically an optional feature that maintained a completely distinct String implementation in alt-rt.jar, which was loaded once the VM option is supplied. Optional features are harder to test, since they double the number of option combinations to try.


Cool Privilege Control System

Privilege Control is very common mechanism. In real life, people are allocated into different roles. Some of who can maintain sensitive information based on his/her access level, and the other cannot. In computer world, that is the same. Microsoft Window is a famous PC OS and it also has a user management system in it. Administrator can create user account and assign different privileges to different user account. E.g. Ricky’s role is administrator and Jenny’s role is guest, both of who launch the system based on his/her Login Name and Password, Ricky can control everything of the computer and Jenny does not have any permission except view right. That is based on theirs privilege.


Cloud Big Data Analytics Adoption Accelerating in Healthcare

More than a third of organizations said that big data analytics was one of their most important spending drivers. Patient engagement and consumer retention and management tools are also attracting attention, with 31.6 percent of respondents stating that they are actively seeking new technologies to help them track and communicate with their patient base. In 2016, close to 40 percent of providers are looking to enhance or refresh their patient portal offerings, while a similar number are planning to expand their electronic communications capabilities by implementing wellness and chronic disease management programs that take advantage of online communication techniques, as well as texting and phone-based initiatives.



Quote for the day:


"It is the framework which changes with each new technology and not just the picture within the frame." -- Marshall McLuhan


February 06, 2016

Large Scaled-Scrum Development Does Work!

Close interaction with the customer is one of our cornerstones and has been a significant factor in our success. Our customers are welcome during the entire flow of product development: we allow some customers to directly influence our overall product backlog, we demonstrate existing and new features per customer demand, and customers are invited to join the test labs within the development process. Any feedback given by customers at demos or test labs flows into the development: this way we can identify early on whether the developed functionality will lead to true customer value. Our product-deployment support provides support to any customer; a kanban team composed of dedicated deployment managers and team members from the development teams drives this initiative.


Why You Should be a Little Scared of Machine Learning

What deep learning will allow us to do is to bridge the semantic gap between the fuzzy thing that is the real world, and the symbolic world computer programs operate in. Simply put, machines will soon have much more understanding of the world than they currently do. A few years from now, you’ll take a picture of your friend Sarah eating an ice cream cone, and some machine in the cloud will recognize Sarah in the said picture. It will know that she’s eating ice cream, probably chocolate flavored by the color of it. Facial expression recognition will make it possible to see that she looks excited with a hint of insecurity. Combining information from multiple third party data providers, it won’t be too difficult to infer that you and Sarah are on your third date together.


The Rise of Consumer Health Wearables: Promises and Barriers

In spite of these promises, the actual use of consumer wearables within a clinical population remains limited. The potential applications described above are still in the early stages of development, have not been approved for medical use, and have so far been explored predominantly within an academic research rather than a real-world context. Clinical studies to date that have a closer resemblance to consumer wearables involve (1) pedometers and smartphone apps to tackle a sedentary lifestyle and obesity and (2) home telemonitoring solutions for patients with pulmonary conditions, diabetes, hypertension, and cardiovascular diseases.


The 'Fin'-ternet of Things: exploring the potential of IoT in the finance sector

The financial services sector, starting with insurance, capital markets and actuarial information, has always led the way in the collection, analysis and monetisation of personal data. The very concept of KYC (Know Your Customer) regulation revolves around the bank's ability to detect and prevent identity theft, fraud, money laundering and terrorist financing by identifying unusual behaviour patterns from the customer. Away from regulation and compliance requirements, this enhanced customer insight is helping to change and improve the way financial institutions interact with customers. When IoT crosses with finance, we suddenly get an explosion of data, which will bring even greater opportunities to obtain data and build even more accurate profiles of customers.


Steve Ballmer talks about the current state of Microsoft ...

When you take a look at the transition from server software to Azure, what's going on in terms of cloud infrastructure, the company is absolutely the No. 1 company serving enterprise backbone needs, which is fantastic. It's making the migration to cloud. We started a good thing with Azure, and the company has made well more than two years of progress in terms of being able to compete with the right cost profile, margin structure, and innovation versus Amazon. There's still a lot to do on that. It's not like the company rides the same momentum. I think the company in terms of the investments it's making in evangelizing those products, supporting those products technically, I think it's really doing a good job.


User Behavior Analytics: The Force of Cybersecurity Awakens

Besides cyber intelligence, companies and government agencies will begin using Blockchain encryption to protect against cyberthreats. Blockchain is the public ledger of Bitcoin transactions, which is updated by a network of several computers solving complex algorithms for verification. As such, it is considered a secure way to record data, as tampering with the records would require taking over majority of the computers in the network - a nearly impossible feat. MIT has tapped Blockchain technology to build Enigma, which could potentially allow databases to retain sensitive information and process it without risking exposure to malicious parties.


How Google's AI breakthroughs are putting us on a path to narrow AI

"If you want to solve consciousness you're not going to solve it using the sorts of algorithms they're using," he said. "We all want to get to the moon. They've managed to get somewhere up this stepladder, ahead of us, but we're only going to get there by building a rocket in the long term. "They will certainly develop useful algorithms with various applications but there will be a whole range of applications that we're really interested in that they will not succeed at by going down that route." In the case of DeepMind, Stringer says the reinforcement learning approach used to teach systems to play classic arcade games and Go has limitations compared to how animals and human acquire knowledge about the world.


IAP: Fast, Versatile Alternative to HTTP

IAP addresses many of the use cases that HTTP 1.1 ignores. While HTTP2 and WebSockets definitely address several problems not addressed by HTTP 1.1, we believe that more is still required, as we describe in our blog: Why HTTP2 and Websockets are not Enough. IAP is a free flow message based protocol. The communicating nodes exchange messages, just like HTTP requests and responses. However, IAP does not require that each message have a response. Being a free flow protocol, IAP specifies only that nodes exchange messages. Messages can flow freely in both directions of a network connection as the communicating nodes see fit for the purpose of the communication. We have described some of the core message flows in more detail in our tutorial IAP Message Flows.


Blockchain technology to disrupt financial, legal fields

Blockchain technology is going to enable disintermediation in a great many fields that until this point have largely not been digitally disrupted. Blockchain technology ... could take an enormous amount of friction [out of] legal processes and legal costs. One person's friction is another person's profit. I also think thatbanking and financial services could be significantly changed by the integration of blockchain technology. One thing that I predicted in the book, which is now happening: Goldman Sachs recently filed a patent for creating its own digital currency, which is really sort of a walled-garden use of blockchain technology, to settle foreign transactions and asset settlements, from stock sales to wire transfers and the like. Goldman Sachs is quintessential Wall Street. To see Goldman Sachs move in this direction I think portends a lot of what is to come.


Evolving Our Security in 2016

It’s important to note that as companies build out their IoT ecosystems, whether for the consumer or business market, connectivity and security standards are almost nonexistent. Most of these projects involve customization and add to this the fact that there isn’t one dominant technology service provider in the IoT space and the approach to standards is at best fractured. And of course all of this has implications for security. In fact, during 2016 we’re set to witness more examples of security vulnerabilities related to IoT. This is inevitable. The lack of standardization means IoT is an incredibly fragmented space and one in which network security has not been a priority for device manufacturers.



Quote for the day:


"I have no special talents. I am only passionately curious." -- Albert Einstein


February 05, 2016

Container networking offers opportunity to simplify networks

In bare-metal and physical environments, container networking is similar to VMware networking -- with two deviations, according to Brandon Philips, CTO of CoreOS Inc., a container platform vendor. First, explains Philips, containers come and go more rapidly than VMs, so the network needs to be designed around this reality. Second, people are going to run many more containers than they would VMs, so the amount of address space that a container environment may consume is likely to be larger. ... By not needing its own operating system as part of an application image, a container application image can be smaller; meanwhile, the corresponding density of a container deployment can be higher than an environment based on VMs.


Automating Access Solves Many of Life’s Business Problems

You may not think much about when your employees need their password reset, but this is actually the single most common call that employees make to the helpdesk. Though this is an easy task, it is time consuming for both the helpdesk and the end user. In addition, this is a major problem for employees who work outside the times of the help desk. If an end user works nights, weekends or even in a different time zone and is locked out of an account, he is unable to contact the helpdesk to reset the password. This leaves the employee unable to access applications or system until the helpdesk receives and processes the request, leaving the employee unproductive.


Testing: Mind the DevOps Gap

DevOps projects tend to start in one part of the continuum from development to operations. There is nothing wrong with taking this approach. However, it is also important to “Mind the Gap” and work to expand automation across the continuum continuously. One way to ensure that automation can expand easily is to deploy sandbox technology across the continuum, beginning with development and continuing through configuration and release management. The sandbox ensures that at each step, the production configuration and workload is being replicated. Sandboxing technology has been used in development in the past, but is relatively new to the entire DevOps process. As more companies move to continuous integration and continuous deployment, however, the need for sandboxes is growing.


Digital Transformation Requires Total Organizational Commitment

By injecting new thinking into a company, employees can start to see that there are different ways to handle those standard business practices and can begin to incorporate that type of creative thinking into their organizational philosophy. When you consider that 88 percent of the Fortune 500 companies in 1955 are now gone, it’s not hard to see that change has always been with us, but the rate of change is accelerating dramatically due in large part to the disruption brought about by digital transformation. “The cool thing is that incumbents recognize that the same assets that can hold them back, can also be used to compete in a different guise,” Levie said. That means it’s not all gloom and doom, companies just have to start thinking much more creatively about their digital future and the effect that will have across the organization.


Cisco Bets Big On IoT With $1.4 B Jasper Buy

Jasper's focus has been on managing devices connected by cellular radios, which explains the company's relationships with mobile operators around the world. "We see cellular as an important, and increasingly more important, transport in IoT," said Trollope, noting that cellular connectivity has not previously been a focus for Cisco. Businesses, he said, tend to rely on cellular connectivity when tracking high-value assets like vehicle fleets. Similarly, security applications tend to include cellular connectivity because WiFi often isn't as reliable or available. Gillett sees Jasper's focus on cellular as a boon for security, because cellular networks are more controlled than the open Internet. "Jasper is not a security solution but security is part of its value proposition," he said.


Microsoft SDN stack to challenge Cisco, VMware

Even without a fully baked SDN stack, Microsoft is already on enterprises' radar. A global survey of companies and public cloud providers found that a "significant number" identified Microsoft as an SDN vendor, said Brad Casemore, an analyst at IDC.  ... "Microsoft will still need hardware partners for the network underlay, just as VMware has underlay partners for [SDN product] NSX," Casemore said. "But Microsoft will indeed be increasingly perceived as an SDN vendor within its installed base of customers." To date, industry experts have said Cisco and VMware are in the best position to bring SDN to many enterprises. Both vendors are leveraging successful product lines to sell their SDN frameworks. In Cisco's case, it's network switches, while VMware is tapping the many companies using its data center virtualization platform.


The Agility Challenge

When we talk about ‘Agile change’, many organisations could be said to be “Agile by accident”. In those places, Agile mindset, principles and practices have emerged at the team or the programme level, typically within IT. If it is the IT that continues to drive the Agile initiative on its own, then it will remain the only place where Agile will be in evidence. This will usually lead to a “clash of cultures” between the emerging collaboration culture within the delivery teams, and thecontrol culture dominant in the rest of the organisation. ... So, how do we get the ‘Business’ and ‘Management’ on-board and get them to recognise the opportunity of Agile? To start with, we should stop talking to them about Agile. Instead, we should discuss business outcomes and impacts. And we should explore delivery capability and the fact that there is always more of the stuff that we want to do than we can actually do.


SDN in Enterprise Moving Past the Hype, Survey Finds

SDN and NFV decouple the control plane and various networking tasks—including routing, firewalls, intrusion detection and prevention, and load balancing—from the underlying hardware and put them into software that can run on low-cost commodity systems, including switches and servers. The goal is to enable businesses to build networks that are easier to program, scale and manage, that are more agile and flexible, and that cost less than traditional infrastructures. Cost savings is a key driver, according to the survey. Fifty-three percent of respondents said it was a top benefit, followed by 47 percent who cited improved network performance, 46 percent who said increased productivity and 45 percent who said improved security.


How To Fix a Broken CRM Pipeline

a CRM’s contact and account information are valuable to management — but those pale in comparison to the value of deals that will (or won’t) make the quarter. If a CRM system helps win just one more deal every quarter, it more than pays for itself. Unfortunately, too many sales pipelines are just baloney: wishful thinking about deals that will never close (or, worse, that don’t exist at all). There’s also the opposite problem: Big deals that may well close, but don’t show up in the system at all until they do. These “miracle” deals are never harmless surprises, and can be downright dangerous if you have a long supply chain. The good news is that there are several metrics you can use to validate the pipeline health. But simple numbers need to be supplemented by policies, automation, and business processes that provide incentives for good behavior.


Android Marshmallow: The smart person's guide

Finally, Google has seen to it to allow end users to manage app permissions (without a third-party software). With this feature you can disable permissions for each app by feature such as Body sensors, Calendar, Camera, and Contacts ... Google Now On Tap takes this to a whole new level. When you're in an app screen and you long press the Home button, Google Now On Tap will present cards related to whatever you are viewing on the screen. This is an incredible breakthrough for those that want instant information about specific subjects. ... Device security is at a prime now. If you purchase a new device running Android Marshmallow, full disk encryption will be enabled by default. Devices upgraded to Marshmallow will have encryption disabled by default.



Quote for the day:


"Whatever you think the world is withholding from you, you are withholding from the world." -- Eckhart Tolle


February 04, 2016

World Quality Report 2015-2016

Based on analysis of five respondent groups: CIO, VP Application, IT Director, QA/Testing Manager and CDO/CMO, the report surveyed respondents from across the globe through quantitative interviews followed by qualitative deep-dive discussions. Key findings from this year’s report: The impact of IT quality on the end-user experience is a driving force for today’s digital transformation initiatives; QA and Testing budgets have increased 9% year-on-year; Enterprises are widely embracing agile and Development and Operations (DevOps) methodology; Shorter program and application lifecycles are creating increased demand for testing hardware and infrastructure.


The first Ubuntu tablet is a desktop too

Behind the scenes, Ubuntu's convergence is designed to help the ecosystem to grow. There's no point buying into a new ecosystem if there aren't any apps, but equally there's no incentive for developers to make those apps if nobody's buying the phones. This is a real hassle as developers have to build different versions of their apps for the iPhone, iPad and iMac or for different Android devices, but less of a problem for Ubuntu when they only need to build one app and it will work on any Ubuntu phone, tablet or computer. The M10 tablet has a 10.1-inch high-definition display. The screen is protected by Asahi Dragontrail glass, a rival to the tough Gorilla Glass used for the displays of devices including Samsung and HTC smartphones. It's 8.2mm thick and weighs 470 grams (16.6 ounces), feeling lightweight and easy to handle.


Best Agile Method For Your Team: Scrum Vs. Kanban

One of the key differences between scrum and kanban is that kanban places the project and its needs at the heart of the process. In scrum, the sprint and its time box is at the core. Kanban radically changes the way that projects are managed within the non-project environment of the organization, while scrum is more appropriate for organizations in which development is constant rather than episodic. So which is right for your team or company? It really depends on what problem you're trying to solve. Kanban is more linear; scrums are intensely multi-threaded. Kanban looks at agile from the project perspective. Scrum assumes that work on products and systems never ends.


Collaborative Overload

Any effort to increase your organization’s collaborative efficiency should start with an understanding of the existing supply and demand. Employee surveys, electronic communications tracking, and internal systems such as 360-degree feedback and CRM programs can provide valuable data on the volume, type, origin, and destination of requests, as can more in-depth network analyses and tools. For example, Do.com monitors calendars and provides daily and weekly reports to both individual employees and managers about time spent in meetings versus on solo work. The idea is to identify the people most at risk for collaborative overload.


Cybercrime Costs More Than You Think

Cybercrime has become big business. Instances of cybercrime cost the global economy about $450 billion annually. Beyond the monetary damages associated with the crime itself, an instance of cybercrime can severely damage a company's reputation, indirectly affecting the bottom line for years to come. In this paper, we explain how companies can mitigate the reputational risk associated with a cybercrime through internal and external communications practices. Our findings include: The median cost of cybercrime has increased by nearly 200 percent in the last five years and is likely to continue growing; The reputational risk associated with cybercrime extends well beyond monetary damages; and Having a plan in place for how to respond to a cyberattack could save millions.


Hackers claim to have hijacked NASA's Global Hawk drone; NASA says not true

The drone takeover allegedly occurred on April 9, 2015. The zine states, “After countless months of successfully retrieving NASA drone logs automatically, we noticed some weird traffic;” a single .gpx file was pushed out to Global Hawk each time it returned to base, indicating it had a “pre-planned route option” sent over WLAN. The group decided to do something “sinister,” using a man-in-the-middle attack to upload its own custom. gpx file to control the drone and “to crash the Global Hawk into the Pacific Ocean.” ... Shortly after the drone left its predetermined flight plan, NASA noticed and took manual control of the drone.


4 Things Employees Hate About IT (And How To Fix Them)

Chapleau's team used its PÜLS software, ... to find out what their biggest IT complaints were, and how businesses could address them to derive more value. The results were published in Green Elephant's IT User Satisfaction Annual Report. It turns out, getting back to basics is the key. ... "What we wanted to do was emphasize that, to bring greater business value from IT, you have to take user satisfaction and your users' needs into consideration, first and foremost. It's about trust and being able to meet basic user needs; if your users' basic needs aren't being met, they won't trust you to introduce new, cutting-edge and innovative technology, and they won't use it," Chapleau says. Here are the top four things users hate about IT, and how to fix them.


How AI and automation could hollow out the US job market

The argument that automation will worsen inequality is sometimes rejected on the grounds that business owners won't act against their own interests. The reasoning goes that if business owners impoverish their workers they undermine those workers' ability to buy goods and services from that business. However, Kopczuk says this argument is undercut by there being no simple mechanism for employers to collude to keep workers employed and well-paid in this way. "It's a very old argument. I think I would associate it with Henry Ford, 100 years ago. You pay your workers so that they can afford to buy your cars."


Cloud security culture a building block for today's businesses

"An analogy you might think of is a neighborhood block watch," Reavis said. "If you have everybody aware what's going on in the neighborhood, it can be a real strength and really augment the overall security posture of an organization." Lillie has a multilayered approach for cultivating a security culture. Part of it involves a "fleet of tools" --cloud access security brokers, software that protects cloud services; identity management tools; mobile device management; and laptop system protection, to name a few. But just as important as technology is bringing on security team leaders who can communicate the value of crafting and executing a security strategy, and can build relationships across the teams they're going to work with -- from applications to infrastructure to business departments.


CIO interview: Fergus Boyd, vice-president for digital, Yotel

Despite having several partners that help deliver the IT that underpins its operations, the global team delivering the technology and digital initiatives is composed of only four people, while the flagship New York hotel has its own team. The department will grow this year to aid work going into the new hotel openings. Boyd says the main challenge he faces as a leader in a fast-changing and highly competitive sector is to manage tight budgets, as well as retaining talent and developing good in-house expertise. “We have a very aggressive growth plan for the company, so keeping up with that and the pace of change of new technology will be key to success,” he says.



Quote for the day:


"The thing that makes you say, 'I want to do something' -- that is the beginning of talent." -- Stella Adler