December 14, 2012

Examining Some Networking-Virtualization Chimeras
The blog author has been thinking more about some of these networking-virtualization chimeras, and thought it might be interesting to talk about them, if for no other reason than to encourage the RSGs to correct me and help everyone understand a little better.


Update: Apple's iPhone found to infringe Sony, Nokia patents
The jury found that the iPhone 3G, 3GS and 4 directly infringed claims in U.S. patent 6,070,068, which was issued to Sony and covers a method for controlling the connecting state of a call, U.S. patent 6,253,075, issued to Nokia and which covers call rejection, and U.S. patent 6,427,078, also issued to Nokia and which covers a data processing device.


Generating .NET POCO Classes for SQL Query Results
Note that the code generated from Object Relational Mapping (ORM) tools such as Entity Framework, LINQ to SQL’s SQLMetal, NHibernate and SubSonic generate code for the schema objects contained with the database--not the results of queries. Regenerating the code due to a database schema change can overwrite your customizations if you're not careful. Managing a custom POCO class can be a better option.


What You Need to Know about Open Source BI
Do companies understand all the factors involved and what they’re really getting when they select an open source business intelligence platform? Analyst Lyndsay Wise, author of the new book “Using Open Source Platforms for Business Intelligence: Avoid Pitfalls and Maximize ROI,” believes that people get caught up in the advantages of open source over proprietary software, often without evaluating whether the platform will fully meet their needs.


Q&A: The True Cost of the Cloud
Another recent "Ah ha!" for many CIOs is the cloud service invoice. Some are surprised at how many services are spun up and left running and surprised at the resulting high cost. Many are beginning to realize cloud resources left on are significantly more expensive than managing resources themselves -- even if they are calculating people costs.


Rejection Breeds Creativity
New research from Johns Hopkins University suggests that having our ideas rejected tends to boost our creativity output. Sharon Kim and her colleagues found that when most of us experience rejection, it can actually enhance our creativity, depending on how we respond to it.


Nine Ways Successful People Defeat Stress
This is life in the modern workplace. It is more or less impossible to be any kind of professional these days and not experience frequent bouts of intense stress. The difference between those who are successful and those who aren't is not whether or not you suffer from stress, but how you deal with it when you do.


The Man Looking to Turn Samsung into a Silicon Valley Trendsetter
Leading this effort is Young Sohn, who started at Samsung in August as president and chief strategy officer. He has spent a long career leading several successful Silicon Valley semiconductor and storage companies after founding Intel’s PC chipset business and running its joint venture with Samsung in the 1980s. MIT Technology Review business editor Jessica Leber sat down with Sohn in his office in Menlo Park, California, to talk about his new mandate.


China investigating Amazon's e-book business
A Sohu IT report Friday said the General Administration of Press and Publication of China (GAPP) has launched an investigation looking into Amazon and its Chinese partner, Chineseall.com, and whether they have violated regulations in selling digital publications.


Enterprise tech biz leaders debate where the market is headed in 2013
With the end of 2012 just around the corner, plenty of trend predictions are trickling out left and right as everyone wants to predict the future. The enterprise technology world is no exception, and a group of CEOs of some of the fastest-growing businesses in this segment gathered for a roundtable discussion on Thursday morning to discuss the near future of computing.



Quote for the day:

"The secret of happiness is to count your blessings while others are adding up their troubles." -- William Penn

December 13, 2012

Future of Data Management
According to a recent Enterprise Management Associates end user research survey on Big Data, the future of data management platforms is with multi-structured data sets and flexible data schemas spread across multiple platforms.


Implementing IT Balanced Scorecard
The Balanced Scorecard as it has evolved over a period of time is being looked at not just as a performance measurement tool, but as a strategic planning and management system. This is because, the Balanced Scorecards can be cascaded down smaller business units including IT and aggregated upwards to the higher-level.


Working as a Software Developer
Henrik Warne gives his views on the main differences between professional software development and programming for a university course as part of his talk for the engineering students. Henrik talks about challenges with large-scale software development, several development practices used to cope with these challenges, ways to become a better programmer, and some fun facts from work.


Google has 'no plans' to build apps for Windows 8, Windows Phone 8
Speaking to V3, Google Apps product management director Clay Bavor said the firm has, "no plans to build out Windows 8 apps." Google already has a search application for the Windows 8 platform -- which it released just before the Windows 8 launch in October -- but will retain its focus on the iOS and Android platforms


Oracle Rolls Out New Database Security Package
The offering, Oracle Audit Vault and Database Firewall, provides both network traffic sniffing for security threats and audit data analysis. It also adds the ability to audit OSes, directories and other sources, beyond Oracle's database and third-party database systems, according to the company.


The Importance of Character and Presence
Two aspects of our work contribute to our success as change professionals: What We Do—the concepts, frameworks, processes, and techniques used when engaged with clients; Who We Are—our true nature…the substance of what we have to offer as human beings


Deep Dive: What's New in Hyper-V, Part 1
Windows Server 2012 brings so many changes to so many areas that it'll take months before we see how it all plays out in the marketplace. One thing is clear, however, with the new Hyper-V: Microsoft is taking on the competition head on. No longer content with being "good enough", they have leapfrogged VMware in several areas.


U.S. sees tech's 'center of gravity' shifting to Asia
By 2030, Asia "will have surpassed the North America and Europe combined in terms of global power, based upon GDP, population size, military spending and technological investment, the U.S. Office of the Director of National Intelligence report said. "China alone will probably have the largest economy, surpassing that of the United States a few years before 2030," the report said.


London buses to accept contactless NFC payment
The BBC reports that the Big Smoke’s 8,500 buses will be accepting payments through near field communication (NFC) technology, so passengers can swipe a debit or credit card to pay, as well as use a charge card through a mobile NFC reader.


Dell commits to open-source software for its future clouds
The company said its upcoming public and private cloud products will be built around OpenStack, a package of software for running clouds that has received broad backing from the technology industry from companies such as HP, Cisco, IBM, Red Hat and Intel.



Quote for the day:

"You must be single minded. Drive for the one thing on which you have decided." -- General George S. Patton

December 12, 2012

The scariest software project horror stories of 2012
Though plenty of enterprise software projects go just fine, unfortunately, some still end up in ruins, leaving customers out huge sums of money, churning up lawsuits, damaging careers and destroying relationships. On the bright side, when examined these failures can reflect some important lessons for both vendors and customers to take to heart. Here's a look at some of 2012's scariest software project disasters.


Intel Open Sources Tool for Rapid Big Data App Development
Currently in beta, GraphBuilder is designed "to help data scientists in industry and academia to rapidly develop new applications that draw insights from big data," said Connie Brown in an announcement on the Intel Web site. "Developed by Intel Labs, GraphBuilder is the first scalable open source library to take large data sets and construct them into 'Graphs,' web-like structures that outline relationships among data."


Agile Expressionism 101
It would be fun to talk about the kinds of expressions you hear in an agile environment. Mark polled the folks in his company, Asynchrony Solutions, and here's what they came up with. As is the case with most things agile, many of these are not new or unique to it. So here they are in no particular order and with no chance that this is an exhaustive list.


2013 GRC Trends
Performance gains, reduced costs, improved compliance, and other benefits have shown that GRC programs, and the technologies that support them, can move a company forward and sometimes even save the day. The question is what will be the course in 2013?


Emerging Enterprise Architecture Drives 10 Trends for 2013
This Research Alert is the first of a two-part series identifying the most impactful, emergent trends we see as clear and undeniable evidence of this transformation. Each is accompanied by a Saugatuck Strategic Planning Position (SPP) that lays out specific expectations regarding its relevant impact and timing.


New Guidance to Mitigate Determined Adversaries’ Favorite Attack: Pass-the-Hash
In a large number of the targeted attacks we have seen, attackers have attempted to use a “Pass-the-Hash” (PtH) technique to get access to credentials. Today, Microsoft is publishing a comprehensive whitepaper that contains mitigations and guidance called “Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques.”


Will cloud computing kill the storage area network?
Everything you need is provided by the modular converged infrastructure, which is now a simple building block for the data center. Traditional storage only vendors have seen the light and are now joining forces with the major network vendors to create the modular building blocks (what I call PODs) which include the storage as a part of the building block.


Data Scientist Shortage: Split Role In Half
One possible solution to this staffing shortage is to split big data duties in two: data management specialist and data scientist. In a phone interview with InformationWeek, Datalink technology strategist and consulting principal Steve Bulmer said this division of labor would help IT organizations prepare for the coming "tidal wave" of data. "Advanced analytic capabilities are going to be in high demand and hard to find," said Bulmer.


By 2020, there will be 5,200 GB of data for every person on Earth
During the next eight years, the amount of digital data produced will exceed 40 zettabytes, which is the equivalent of 5,200 GB of data for every man, woman and child on Earth, according to an updated Digital Universe study released today. To put it in perspective, 40 zettabytes is 40 trillion gigabytes -- estimated to be 57 times the amount of all the grains of sand on all the beaches on earth.


The critical difference between leadership and motivation
Great leaders serve to bring out the inner wisdom and free will of those they serve. Instead of inducing people to view life situations a certain way (or their way), great leaders demonstrate that there are an infinite number of ways to view any life situation.



Quote for the day:

"Chains of habit are too light to be felt until they are too heavy to be broken." -- Warren Buffett

December 11, 2012

Future Cloud is safe, agile and efficient
In five years, companies will operate in a converged IT world of cloud, virtualisation and mobile computing where clouds are safe. IT organizations will have better visibility, control and compliance across their private and public clouds. To get there, Symantec extends its security, data storage and information management expertise to help companies transition to safe clouds of the future.


With Zenprise, Citrix Tightens End-User Computing Strategy
Considering Citrix has been standardizing on Xen in most of its product names, the marketing department should be thrilled with this acquisition. There's more to that acquisition than just a cool marketing twist, of course. Citrix has become, in my opinion, the very first company to have an end-to-end end-user computing solution for the enterprise.


Tech World Discovers New Species: The Cloud Architect
Inextricably tied to the internet hype machine, cloud computing is a difficult concept to pin down. The term has come to mean almost anything. But there are cases where it represents a very real change not only in how computing power is accessed, but in how data center infrastructure is built.


What Hadoop Is. What Hadoop Isn’t.
Database vendors see it as a database and challenge it on those grounds. Data integration vendors see it as an ETL tool and challenge it on those grounds. Analytics vendors see it as a replacement for their engines and challenge it through that view. In doing so, each vendor community overestimates Hadoop’s potential for displacement of their product, while simultaneously underestimating the impact that it will have on the environment and architecture they operate in.


Transforming Three Vs of Big Data into Three Ws of Business Analytics
The three Ws are the What, which refers to the data and information itself; the So What, which refers to the analysis of the data or the process of deriving implications and meaning from the data; and the Now What, which refers to the decisions made from the data and the resulting actions.


Special Report: Amazon's billion-dollar tax shield
Amazon is channeling huge amounts of money through a small Luxembourg-based unit, largely to avoid paying hundreds of millions of dollars in U.S. and European taxes, a Reuters report suggests. There's no commercial reason for the creative-but-legal accounting, which is attracting scrutiny from U.S. officials. "The IRS shouldn't be happy about this. It sounds like they're not," says tax expert Michael McIntyre.


By 2020, the use of Big Data will improve the understanding of ourselves and the world; Nowcasting, real-time data analytics and pattern recognition will surely get better; Big Data has the potential for significant negative impact that may be impossible to avoid -- Check out the nice infographic for more.


PerfView Tutorial 3 - Resolving Symbols(Channel 9 Video)
The PerfView tool is a free Windows performance tool developed by the Microsoft .NET Runtime Performance team for investigating both managed can unmanaged performance problems. If you are having a performance problem, especially if it is a .NET application, it is hard to overestimate the value of this tool.


The first 100 days of a new CIO: Nine steps to success
“In the first 100 days, you have to make your mark. In that period, you also need to formulate a compelling vision, because if you want to lead, as opposed to executing the visions of others, you do need to come out quickly with a story that everybody can align around.”


Keynote: The New Governance
In this keynote presentation K. Scott Morrison, CTO and Chief Architect at Layer 7 Technologies anticipates the future of SOA governance in the enterprise starting from the observation that there are major technological changes in the enterprise today.



Quote for the day:

"Don't let your ego get too close to your position, so that if your position gets shot down, your ego doesn't go with it." -- Colin Powell

December 10, 2012

Defining CRM: Thoughts from three experts
Even between the story’s sources, there was no hard and fast definition. However, I thought it was also interesting to think about how different people define CRM, often depending on their role in a company or as a thought leader in the customer relationship management field.


Why C++ Is Not “Back”
It seems that many of the seasoned developers have forgotten why we stopped using C++ and moved on to Java, C# and other modern languages. Many younger or newer developers don’t really know the history and are getting confused by the current C++ message and resurgence.


Unit Testing Hadoop MapReduce Jobs With MRUnit, Mockito, & PowerMock
A map/reduce pair can be tested using MRUnit’s MapReduceDriver. A combiner can be tested using MapReduceDriver as well. A PipelineMapReduceDriver allows you to test a workflow of map/reduce jobs. Currently, partitioners do not have a test driver under MRUnit. MRUnit allows you to do TDD and write light-weight unit tests which accommodate Hadoop’s specific architecture and constructs.


Listening to Complainers Is Bad for Your Brain
Blake says. "Typically, people who are complaining don't want a solution; they just want you to join in the indignity of the whole thing. You can almost hear brains clink when six people get together and start saying, 'Isn't it terrible?' This will damage your brain even if you're just passively listening.


Java Send Mail Example
This sample illustrates how to send smtp emails using a simple Servlet-based Java webapp easily in Cloud Foundry using email providers like SendGrid and MailGun that both have free levels of service that allow you to send up to 200 emails per day and paid plans to do more. ... Note that on Cloud Foundry smtp outbound on port 25 is blocked. But other ports are open, such as the unsecured port 587 or secured port 465.


Struggling to Manage Knowledge Workers
Peter Drucker was understating the difficulty of the challenge. Into the 21st century, organizations are still trying to get a handle on the best methods of managing knowledge work. In fact, just trying to define the term “knowledge worker” can be difficult. Drucker defined such a worker as “someone who knows more about his or her job than anyone else in the organization” (Hammer, Leonard and Davenport, 2004).


U.S. Congress Passes Another Resolution Opposing U.N. Internet Takeover
The resolution was adopted by the House on Wednesday with a 397 - 0 vote, according to the House's website. The bill, passed by the U.S. Senate in September, emphasizes the importance of the Internet to the global economy, saying that "it is essential that the Internet remain stable, secure, and free from government control."


IT shops will become consultants instead of tech managers, says EMC's CIO
"IT almost plays a passive role rather than an active role in this," Mirchandani said. "The moment you expose the cost of services, the business will ask what's the most cost efficient. IT becomes a broker of services, not necessarily the author of all services. This phase allows business to build the widgets they want off that factory floor [the cloud service]."


A User’s Story: DubDubDeploy
When Donte Ormsby came to InfoQ, it was just a friendly letter to say that he found a great tool for simplifying website deployment using ASP.NET and thought the readers might find it useful. After talking a bit, InfoQ decided the best way to introduce DubDubDeploy to the readers would be for him to just tell his story.


Risk Management: A Process or a Way of Life?
The folks at Active Risk talk a lot about establishing an "Active Risk Culture" at your organization - really making risk management a way of life, rather than a set of sterile processes. As a concept that sounds interesting, but how does it really work? Loren Padelford, Executive Vice President & General Manager at Active Risk offers some clarification in his responses below.



Quotes for the day:

"Time is our most valuable asset, yet we tend to waste it, kill it, and spend it rather than invest it." -- Jim Rohn

"We don't have as many managers as we should, but we would rather have too few than too many." -- Larry Page

December 09, 2012

Data Center Operations And Its 10 Biggest Mistakes
For better advantage, companies must ensure their data center operation programs are fully successful and functional. This should be done by using clearly articulated operational requirements and by using design maps that can provide benefits, depending upon the profile of the data center.


Pushing Nginx to its limit with Lua
Lua is a scripting language. Specifically, it is a full-featured multi-paradigm language with a simple syntax and semantics that resemble JavaScript or Scheme. Lua also has an interesting story to it, as it is one of the only languages from an emerging country that has had worldwide impact.


Calculating Metrics and Searching with a CodeDOM (Part 8)
This article is about basic analysis of code in a codeDOM, such as calculating metrics on it and searching it. Sources are included. This is Part 8 of a series on codeDOMs. In the previous parts, Ken has discussed “CodeDOMs”, provided a C# codeDOM, a WPF UI and IDE, a C# parser, solution/project codeDOM classes, covered loading type metadata, and handled resolving symbolic references in a codeDOM.


Futuristic handcuffs would administer shocks, drugs
A patent for next-generation handcuffs offers a future in which the detained can be zapped directly from their restraints, and even injected with a medication, sedative, irritant, paralytic, or other fine substance.


Measuring Performance of Enterprise Architecture
Going by the premise, what is not measured does not get managed, it is important to identify the measurable objectives for the Architecture function itself, so that it is well managed and its contribution to the success of the organization is established. While measurement of Architectural activities is difficult, COBIT suggests a set of measurable outcomes and performance measures


Architectural Decisions
For those aspiring to achieve the VCDX certification, the information in this section should help you fully understand & justify your decisions. Being able to justify your decisions is a critical component of creating solid architecture, and an important thing to remember for your VCDX preparation, and especially your defense!


'Eurograbber' Online Banking Scam Netted $47 Million
Over the past year, about 30,000 European banking customers were robbed of about 36 million euros -- that's about $47 million -- in an online banking scam that worked by exploiting mobile devices, according to security firms that stumbled into the operation.


Google Prepares To Bring Its Smart Assistant "Google Now" To Any Device
The move would make Googe Now, which is currently only available on Android phones using the Jelly Bean version of the operating system, more widely available, and could eventually succeed in changing the way people use Google.


Cloud Fabric From GreenButton, A Multi-Cloud Management Platform
The platform features multi-cloud management with a single tool set, known as Mission Control, and an easy to use software developer kit (SDK), including a development emulator for easy enablement of workloads. Mission Control includes commercial features around billing, reporting with organizational control and chargeback.


Try Meditation to Strengthen Your Resilience
Unless you find solid footing in your consistent, unshakable Self, you'll be thrown off balance and lose your way. You'll change your mind at the first resistance. You'll become overconfident when praise abounds. And you'll make poor decisions, just to feel better.



Quote for the day:

"Success is the result of good judgement, which is the result of experience & experience is often the result of bad judgement" --@tonyrobbins

December 08, 2012

Designing for High Availability in the Cloud
The topic of availability is typically broached only in discussions regarding DDOS attacks or Hackvitism. But more and more of the security professionals I have been talking to lately have been interested in topics related to reliability and availability; as their organizations adopt cloud services, more people seem to be interested in these topics.


What Leaders Must Do, Know & “Be”
One way to look at leadership is through a three-part frame: What leaders must Do, Know and Be. At the intersection of these three components, the shaded area, is excellence. It’s where action, feeling and thinking are aligned and integrated into a consistent whole.


The most practical, creative ways to use NFC with your Android device
If you think NFC (Near Field Communication) is only good for Google Wallet or MasterCard PayPass, think again. With the growing number of NFC-equipped phones, NFC tags are becoming an increasingly popular way to take advantage of this sprouting technology. Thing is, Android users aren't quite sure what to do with them.


Answer to six questions on Enterprise Disorders (videos)
Interestingly, “Enterprises” have existed much before the discovery of the framework. Zachman Framework of Enterprise Architecture, is bringing much-needed predictability in the creation, evolution and life cycle management of the “Enterprise.” That’s reason why Zachman Framework is also known as “Periodic Table for the Enterprise.”


Big Data, EHR Driving Healthcare IT Innovation
Gartner says that EHR adoption is a "trigger" for data analytics, improved care management and other innovations. However, these initiatives will take time, the analyst firm notes in a recent report, "Hype Cycle for Healthcare Provider Applications and Systems."


Drive More Value from Your IT Assets
White Paper sponsored by ServiceNow - You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.


To Change the Culture, Stop Trying to "Change the Culture"
We've found that managers get better results when they start with a few smaller successes, which then provide a basis for expanding. Start with one problem — or a few. Get some people to plan a couple of modest experiments to make progress on that issue, with guidance on the kinds of innovation you'd like to see.


Integrate information governance policy for corporate strategy success
The further into the future an organization extends its strategic planning, the more unanticipated risks it's likely to encounter. That's why strategic planning and execution must be an exercise steeped in risk management, rather than tightly focused on activities: The more competence the organization builds in tracking assumptions and managing risk, the better it will execute its overarching strategy without unexpected speed bumps.


True Quality Assurance in an Agile World
Quality Assurance is not just about testing a system. The role of QA on an agile team is much greater than that, elevating the QA engineer to a god among men.


CIOs As Rainmakers: The New Meme, Deconstructed
Pundits called that practice "aligning IT with the business" until, starved for new material, they decided that this was no longer enough. Trust me: The "new rainmaker" will also fall out of fashion. But moving in concert with the business and helping sales, marketing and other departments achieve objectives like making money -- also known as helping the organization achieve critical goals -- will never fall out of fashion.



Quote for the day:

"Truly successful decision making relies on a balance between deliberate and instinctive thinking." -- Malcolm Gladwell

December 07, 2012

Enterprise Data Governance: A Practical Approach to Information Quality Management
It becomes difficult to maintain and manage data without policies, strategies and dedicated efforts by the team across business functions. Data governance seeks to solve these problems, through information policies, data rules, guidelines for managing key data elements and assigning roles for accountabilities and responsibilities.


Finding The Right Blend: Sometimes Pure Agile Isn’t The Way To Go
Agile project managers need to be prepared to work in cooperation with non-Agile project managers, teams that employ traditional methods, and organizations that have resources scattered around the globe. ... Agile adoption doesn’t need to be an all-or-nothing, either-or scenario. The very incremental, iterative concepts that Agile project managers (PMs) apply to their projects can also be applied to Agile adoption.


Gary Hamel On Innovating Innovation
Any innovation effort that doesn’t start by acknowledging that innovation itself is deeply counter-cultural. We’re never going to build a truly innovative company without a gene-replacement therapy. Without that you’re going fail.


SwiftKey Flow review: The Android keyboard you've been waiting for
The new beta version of the popular SwiftKey keyboard released this morning. SwiftKey Flow adds support for gesture-based typing, which means you can type by sliding your finger from one key to another without lifting it off the screen.


Three Examples of New Process Strategy
There are three fundamental ways that companies can improve their processes in the coming decade: (1) expand the scope of work managed by a company to include customers, suppliers, and partners; (2) target the increasing amount of knowledge work; and (3) reduce cycle times to durations previously considered impossible


Telecom NZ trials 4G services
The company announced yesterday that there will be a trial of 4G in the 2.6GHz spectrum band with Huawei in the North Shore, Auckland, while Alcatel-Lucent will run a trial in Lower Hutt, Wellington, on the same spectrum band. In Hawke's Bay, Alcatel-Lucent will also conduct a trial of LTE in the 700MHz spectrum, and in Rotorua, Huawei will trial LTE in the 1800MHz and 2.6GHz spectrum bands.


Don’t Let BYOD Backfire on Your Business
BYOD policies could easily backfire on businesses, unless closely monitored to maintain benefits for employees and the company. Jeff Jones recently wrote a 3-part series on the Microsoft Security Blog called Motivations, Risks and Rewards of the BYOD Trend that examined what the BYOD trend is and then looked at it from the perspective of employees and the perspective of organizations.


.NET 4.5 TypeInfo Reflection
The .NET 4.5 Framework includes some changes to the typical reflection use cases. Most importantly, the Type object has been split into two separate classes: Type and TypeInfo. A TypeInfo instance contains the definition for a Type, and a Type now contains only reference data.


Growth in Cloud Computing to Shape 2013 Security Trends
It's the time when predictions for the new year run high, and when it comes to IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the enterprise to achieve appropriate security for it.


Google kills off free Google Apps offering
In an announcement on the company's Google Enterprise blog today, Google Director of Product Management for Google Apps Clay Bavor said that businesses were too quickly outgrowing the free version of Google Apps, and asking for or moving to paid premium accounts. Instead of a free, limited-user version of Google Apps and the paid premium-based version, Google will now only offer the subscription version.



Quote for the day:

"Creativity is the greatest expression of liberty." -- Bryant H. McGill

December 06, 2012

CSA Security Guidance for Mobile Devices
"To date, the majority of malicious code distributed for Android has been disseminated through third-party app stores, predominately in Asia," according to the report. "Most of the malware distributed through third-party stores has been designed to steal data from the host device." Check out The CSA's recently released assessment and threat report on the state of mobile computing.


5 things a tech lead can do that a Project Manager cannot
As friends would banter, we started talking about how our different roles give us different flexibilities and constraints in projects. I really enjoyed the perspective and though I’d share the things that we thought a tech lead can get away with that a Project Manager cannot.


Are IT Roles Changing?
Technology companies were no longer marketing to IT folks. Instead, they found a larger crowd that can immediately consume their product using personal credit cards and they did not have to wait for weeks and months for us to make those large purchases. Borne out of that movement was the consumerization of IT.


Make Windows 8 boot straight to the desktop
Would you prefer to have Windows 8 bypass the Start Screen and boot straight to the desktop? If so, you can do so using a technique that takes advantage of a feature that is built right into the operating system - no third-party tools required. All you have to do is create a specially configured task that is scheduled to run at log on.


12 Essential Windows 8 Keyboard Shortcuts
Get over it. Windows 8 is different from Windows 7, which means learning new stuff including keyboard shortcuts that can save valuable time vs accomplishing the same thing using touchscreen commands. Here are a dozen of the most useful ones:


Six step methodology for architecting for public clouds
Cloud computing platforms are different from physical and virtualized computing platforms. It is essential to understand the limitation and opportunities while creating solutions for a cloud environment. It also entails the need to look again at architecting methodology. Here we highlight steps you can follow while architecting for public cloud deployment.


Foxtel wants UK-style block on piracy websites
Foxtel, the pay TV network that is owned by Telstra and News Limited, said in its submission (PDF) to the ALRC's review of copyright law that the film studios should be able to go to court and force internet service providers (ISPs) to block specific websites that host infringing content.


PCI validation: Requirements for merchants covered by PCI DSS
Organizations subject to the Payment Card Industry Data Security Standard (PCI DSS) must meet a laundry list of PCI validation requirements on a regular basis to certify its compliance to their merchant banks. These requirements include the need for periodic reports on compliance (ROCs), vulnerability scans, penetration testing and Web application testing.


Understanding Windows Identity Foundation (WIF) 4.5
Mohammed Halabi's aim in this article is to explain the “why” and the “what” rather than the “how”. Once you understand that, the “how” becomes really simple. This article does not assume pre-knowledge of the topics of federation, claims, and WIF so it’s suited for beginners. However, he thinks that also mid-level knowledge audience will also benefit from it.


Leadership Caffeine-Encourage Rethinking to Keep Your Team Sharp
The most effective leaders in today’s ever-changing world cultivate an environment where anything resembling routine reflects an unproductive state of “running in place.” They challenge their team members to constantly “rethink” their assumptions and approaches and to try on new ideas in search of that competitive edge or performance break-through.


Why does a balanced score card matter?
The essence of the balanced scorecard is to translate the vision into goals, communicating and linking the vision with employees and customers, obtaining feedback and learning from the information, evaluating the internal business processes and then conducting business planning to meet the needs of the customer.



Quote for the day:

"Striving for excellence motivates you; striving for perfection is demoralizing." -- Harriet Braiker

December 05, 2012

Amazon Seeks to Disrupt Datacenter Economics 
"The economics of what we're doing are extremely disruptive for old guard technology companies," said Andy Jassy, senior VP of Amazon Web Services, in yesterday's opening keynote address. "These are companies that have lived on 60 to 80 percent gross margins for many, many years, and in fact they set expectations that that's what they are doing. This is what they communicate externally."


SMS Vulnerability in Twitter, Facebook and Venmo
Twitter users with SMS enabled are vulnerable to an attack that allows anyone to post to their account. The attacker only needs knowledge of the mobile number associated with a target’s Twitter account. Messages can then be sent to Twitter with the source number spoofed.


Mobile is eating the world
The world today is focusing on the software that increasingly powers everything thanks to ubiquitous broadband and mobile connectivity, and the barriers to creating applications that leverage the connection to the billions strong digital population of the planet have never been lower.


9 Ways to Sell Your IT Outsourcing Plan to the CFO
"The challenge is that the CIO team often doesn't speak the same language as the CFO team," says Daniel Masur, a partner in the Washington, D.C. office of law firm Mayer Brown. "They don't speak in the same terms. They don't use the same concepts. And, as a result, they just talk past each other."


EMC and VMware spin out big data/cloud division
VMware and EMC today confirmed rumors that have been circulating for weeks that it would spin out its big data and platform as a service (PaaS) cloud products into a new division within the company named Pivotal Initiative, which will be led by former VMware chief Paul Maritz (pictured).


Dev Disasters -- Why They Happen, How to Overcome Them
Whatever the reason, mistakes are something everyone makes. What separates the everyday developer from the truly outstanding one is not the mistake -- it's what's learned from the mistake, and whether those lessons are applied to future projects.


Talend Adds Support for NoSQL Databases and Hadoop Profiling
Talend 5.2 adds the capability to profile Hadoop big data, or gauge the quality and condition of various forms of data stored across an enterprise in an effort to reduce costly data duplication, incompleteness and inconsistency.


Choosing the Right Key Performance Indicators for Data Centers
A September survey of 5,000 data center professionals my company conducted highlighted the metrics that these professionals deal with daily. ... The responses to these straightforward questions indicated a lack of clarity into vital data center performance metrics. What are these issues and their associated metrics for optimal performance?


More IT Pros Going Independent by Choice
There are nearly 17 million independent workers in the U.S., according to a recent MBO Partners study. This number is expected to grow to a whopping 50 percent of the U.S. workforce by 2020, according to the study. The likely culprit has been the poor economy but OnForce's findings challenge that notion.


IETF vs. ITU: Internet Standards Face-Off
A battle is brewing between two standards bodies - the Internet Engineering Task Force (IETF) and the International Telecommunication Union (ITU) - over which group will be the primary source of the underlying communications protocols that allow the Internet to operate in the future.


How to Create an Innovation Ecosystem
If your organization relies heavily on individual innovation, consider creating your own innovation reef, where creative problem-solving experts develop a network of individuals skilled in bringing new ideas to market. There are three essential elements to creating this in your company:



Quote for the day:

"Never leave that till tomorrow which you can do today." -- Benjamin Franklin