June 13, 2013

Wrestling with the concept of private PaaS
Before comparing private versus public PaaS, it's important to understand the definition of Platform as a Service as a technology. PaaS, no matter if it's private or public, provides basic development, deployment and operations capabilities that support the design, coding, testing and management of cloud-based systems. The value of this technology is that it provides your enterprise an alternative to support whatever development tools are in style at the time, including purchasing the servers on which to run them.


Here, FIDO! If We Build Stronger Authentication, Will Consumers Come?
Formed in July 2012, the Fast IDentity Online (FIDO) Alliance is developing specifications for "an open, scalable, interoperable set of mechanisms that supplant reliance on passwords to securely authenticate users of online services". ... There's usually a bit of a chicken-and-egg dynamic at play between vendors, sites, and users – each group needs to believe there is (or will be) a critical mass of the other two, to make their own adoption worthwhile.


New Android malware should be wake-up call for security admins
As soon as a Java or Flash exploit is found, for example, hackers go out and create code that can take advantage of it, and then try to get as many people as possible before a fix happens. But the serious desktop threats are those pieces of malware which are sophisticated enough to use many paths of entry, and complex enough to remain undetected via multiple means of stealth. This is what this particular malware is doing.


Facebook and Microsoft join call to disclose FISA requests
"We would welcome the opportunity to provide a transparency report that allows us to share with those who use Facebook around the world a complete picture of the government requests we receive, and how we respond. "We urge the United States government to help make that possible by allowing companies to include information about the size and scope of national security requests we receive, and look forward to publishing a report that includes that information."


CEM Method advanced principles 2013
BP Group have got to get scientific about the customer experience. CEMMethod has grown and developed over the last decade to make this a reality - get the latest thinking here. ... The CEMMethod® techniques and approaches are flexible and straight forward to use.On occasions an extensive toolkit may be required, in other situations point solutions may be appropriate.


iRobot's New Ava 500 Puts Robotics In Heart Of The Enterprise
The Ava 500 is an autonomous, high-end audio, HD video, top-of-the-line telepresence robot designed to be your meeting surrogate in the enterprise. In the official announcement today, the two companies called the Ava 500 a self navigating, video collaboration robot with Cisco TelePresence EX60. ... The Ava 500 was carefully designed to represent the physical space a human would occupy and deliver an experience that wasn’t a barrier to communications.


90 PC of Organizations will not own or control data: Gartner
"As the amount of personal information increases multifold, individuals and their personal data will increasingly become a security target. And, yet in most scenarios the organization is still ultimately accountable for the personal data on its IT systems," said Carsten Casper, research vice president at Gartner. "The time has come to create an exit strategy for the management of personal data. Strategic planning leaders will want to move away from storing and processing personal data in the next five years."


When Can Worse Data Quality Be Better?
Like truth, beauty, and art, data quality can be said to be in the eyes — or the ears — of the beholder. So, if your favorite music sounds fine to you in MP3 file format, then not only do you not need vinyl records, audio tapes, and CDs anymore, but if you consider MP3 files good enough, then you will not pay more attention to (or pay more money for) audio data quality.


A variety of options make data center expansion difficult
A containerized data center uses prefabricated containers to provide computing space along with suitable power and cooling infrastructure. Containers are dropped off (often on-premise) and interconnected to an existing facility. Additional containers can be deployed as computing needs grow. Containers are often a good fit for long-term projects such as disaster recovery preparedness or during data center renovations.


HP adds purpose-built all-flash array to 3Par lineup
There are other flash-only arrays, including new platforms from startups, that have hardware and software tuned to take advantage of flash drives, said Leah Schoeb, an analyst at Evaluator Group. "The nice thing HP has done is, they've done it within an existing architecture," Schoeb said. As a result, the 7450 brings along features that have been refined on the 3Par platform over the years, including thin provisioning, data compression, replication and snapshots, she said.



Quote for the day:

"Coming together is a beginning, staying together is progress, and working together is success." -- Henry Ford

June 12, 2013

Israel accelerates cybersecurity know-how as early as 10th grade
“What Israel has done is focus much more heavily on technical skills and leave the political work to the politicians,” says Alan Paller of the SANS Institute, who examined Israeli cybersecurity strategy as part of the US Department of Homeland Security’s Task Force on CyberSkills last summer. “Their skill level [per capita] … outdoes everyone, even China,” he adds, despite China’s “massive program” for developing skilled cyber experts.


Podcast recap: HP Experts analyze and explain the HAVEn big data news from HP Discover
There has been a lot said about big data in the last year and HP has made a big announcement around a broader vision for businesses to help them gain actionable intelligence from literally a universe of potential sources and data types. To learn how, BriefingsDirect assembled Chief Evangelist at HP Software, Paul Muller; Chris Selland, Vice President of Marketing at HP Vertica, and Tom Norton, Vice President for Big Data Technology Services at HP.


3 Motivational Mind Tricks Desgned to Power Progress
Understanding how we react to progress is crucial to capitalizing on its power to motivate and engage us with our work. Ignoring it costs day after day of losing steam, running to and fro with carrots and sticks, and losing interest from what feels like an endless run in a hamster wheel. These three mind tricks of progress serve employees and managers alike to break free from hamsterdom and actually get somewhere.


People Don’t Need Cloud, but Flexibility + Control over Data
The other aspect is converged cloud. “Every customer will follow a different path to the cloud,” and HP focuses on how to help them take the journey to the cloud, Neri explains. ... One of the customers’s biggest concerns is “all about change management.” IT, the business owners, they all need to be part of the conversation. “They really get very uncomfortable when they feel they are losing control. It is our role to show them they keep control.”


Why your CMO may spend more money on the cloud than your CIO
"As technology budgets move to the CMO and marketing becomes more data-driven, Salesforce could become the system of record for all customer interactions. Since interactions touch current and future revenue, CRM has the potential to become more central to a business than current transaction systems of record."


IBM’s cognitive computing team takes on a new frontier: meal planning
Working with chefs at the Institute of Culinary Education in New York City, the IBM team is building a cognitive computing system that, given plenty of data about what foods most people already like, will be able to come up with inventive, delicious flavor combinations—far beyond the familiar pairings of tomato and basil, chocolate and strawberry, chicken and rosemary.


Skepticism Moves Big Data Toward Causation
An interesting practical implication of the correlation-causation dilemma, noted by industry luminary Cathy O’Neil, is the risk that putting machine learning techniques in the hands of analytics initiates may be dangerous, since the newbies might be too credulous with the findings, drawing inference from spurious correlations that can lead business astray. I bet many new easy-out big data vendors hope that thought doesn’t gain traction!


Secret NSA hackers from TAO Office have been pwning China for nearly 15 years
Apparently “Beijing was furiousabout the sudden elevation of cybersecurity and Chinese espionage on the meeting's agenda.” That’s when the director of China's National Computer Network Emergency Response Technical Team claimed to have "mountains of data" about the US hacking China. The Chinese version of CERT also disclosedthat between January 1 and May 31, "4,062 US-based control servers hijacked 2.91 million mainframes in China.


Leading Through a Crisis
When everything is broken, what do you do first? How do you show your concern when 1,000 things need attention? If you go to work on five of them, those who feel the most pain about the other 995 will think you don’t care. Furthermore, if you try to work on too many things, you will squander your finite resources while making little progress—thus undermining trust. So what can you do?


How to Evolve your Master Data Management Practices
With maturing data management and additional data sources, your master data management practices need to follow suit. That means finding a new level of support systems for MDM to keep up with evolving business outcomes and expectations. Michele Goetz, analyst with Forrester Research, has been carving out a new framework to bring MDM from the traditional “golden record” to a more rounded “golden profile.” Here are six emerging considerations.



Quote for the day:

"Learn to pause.... or nothing worthwhile will catch up to you." -- Doug King

June 11, 2013

4 Killer New Windows Server 2012 R2 Hyper-V Features
In this new R2 release, Microsoft has reconfigured the architecture to use RDS, even without a network connection. You are probably wondering how that even possible, considering RDS requires an IP address and the network for proper connectivity. Well, the new technology that is enabling RDS without network connectivity is leveraging the VM Bus.


Complexity, skills, experience lie at heart of mobile testing shortfall
There are a litany of reasons to explain the shortfall in mobile testing at the enterprise level, starting with its sheer complexity. Multiple devices, running on multiple platforms using bandwidth provided by multiple networks is a dramatic change in how enterprises manage computing. “At the end of the day, mobile is not an isolated effort,” says Gal Tunik, senior project manager of Functional Testing and Mobile Delivery, Software at HP. “It must be integrated into the normal delivery process.”


Eight is enough! IT's biggest frenemies
You probably have a good idea about who your enemies are. But what about your frenemies? ... The biggest problem with frenemies is that you have to work with these people. You might even have to be nice to them. But while you may never end up BFFs, you don't have to put up with all their shenanigans. Here are eight common frenemies and how to keep them in check.


Fast IPC - New implementation
"For a few years I used excellent shared memory IPC implementation by studio_ukc: While it is really fast, there are several drawbacks. Also, many members were routinely asking for the working code of that class - the one available for the download needs to be fixed (although some fixes are available in comments section). I decided to go ahead and upload my own implementation based on the same idea, but with most of drawbacks eliminated. Please read original article before proceeding with this one."


Creating custom shapes in PowerPoint 2010
PowerPoint has a lot of great preset shapes, but sometimes what you really need is a custom shape tailored-made for your presentation. If you’re looking to go beyond the Freeform Tool to create more complex custom shapes, make use of the new feature in PowerPoint 2010 and upwards called Combine Shapes. The Combine Shapes tool allows you to create new shapes by combining multiple shapes in one of four ways: Union, Combine, Subtract, or Intersect.


Showing Your Customers the Respect They Deserve
Storyboarding is a great example of "meeting the customer on their turf." The pictures don't have to be polished, but the storyboard must be complete enough to tell a full story, and that takes effort. By creating the storyboard, the team has done all the mental heavy lifting. The customer gets to experience the story and provide their reactions. It tells the customer: "Your time is valuable, we want to respect it."


Private PaaS eases enterprise governance, cloud security concerns
Even if public PaaS is not an option for an organization, offering a private version lets IT operations teams provide developers with greater agility and self-service, while still being simpler to manage than a traditional development environment, said Chris Turra, a web operations engineer at Mozilla, the nonprofit Web development organization behind, among other things, the Firefox browser.


Secure Agile Software Development: Never One-and-Done
Obviously, with such a rapidly changing environment, we have to make sure that we do not employ point-in-time security controls. Security must be a constant, and as a result it needs to be integrated into the entire process. To do this, organizations must keep a few things in mind. ... Automation is key for most organizations as a result, and by automatically checking source code for security flaws, you can better ensure the security of that code before it goes into production.


IT chiefs worried by vendor lock-in risk missing out on cloud, big data
Rick Simmonds, managing partner at outsourcing advisors Alsbridge, which conducted the research, said companies often don't have the data readily available to know whether what they are getting is what they need in the current market. "Typically clients are negotiating outsourcing contracts every few years or so and in house there isn't great depths of current market information," he said.


Mentorship: 3 keys to success
It turns out that not everyone recognizes the greatest value of mentors until after the fact. Actually, many don’t realize they’re in a mentoring relationship until years later when they’re in the mentor’s shoes. One leader referred to his mentors as “the ones that didn’t fire me when they had grounds to, but helped me succeed instead.”



Quote for the day:

"In relative terms, we are in good shape. In absolute terms, we are not in the required shape. Unfortunately we have more threats than Finland, Sweden, or even the United States." -- Isaac Ben Israel

June 10, 2013

Automated Verification of Design Patterns: A Case Study
Given the complexity of design verification and the frequency by which they need be carried out, practitioners also need tools that automate and report any conflicts between design and implementation at the click of a button. However, these needs have so far been di cult to reconcile in practice. Proving and preserving the conformance of a program to its design documentation is largely an unsolved problem.


Google Biometrics Tests Show There's No Magic Pill for Passwords
Regina Dugan, who leads special projects at Google-owned Motorola, disclosed at the All Things Digital conference last week that the company was experimenting with the new forms of biometrics. The technologies are a long way from adoption, but they reflect the boldness with which Google is looking for password alternatives.


Silk platform combines blogging and data visualization
Silk mixes unstructured blogging with structured data, allowing you to visualize and query the structured portion of your information. "Explore" lets you generate a sortable table; bar, line or pie chart; or map (oddly, Silk will attempt to map non-geographic data, such as plotting "iOS" in Greece). Visualizations can be filtered interactively to look at just some columns or only records that meet certain criteria.


Business Analytics Will Be Central for Business Reinvention-Gartner
“We are rapidly heading towards a world of analytics everywhere,” said Dan Sommer Principal Research Analyst at Gartner. “Gartner predicts that analytics will reach 50 per cent of potential users by 2014. By 2020, that figure will be 75 per cent, and we will be in a world where systems of record, systems of differentiation and systems of innovation are enabling IT, business and individuals to analyze data in a much denser fashion than before.


Strategic capacity planning in virtualized data centers
Virtualization is great for streamlining data center operations, but overstuffing servers can easily backfire. The technology is here to stay, so IT teams must look to strategic capacity planning and make the most of their hardware or end up wrangling with inefficiencies in the future. Virtualization expert David Davis talks about maximizing server space, capacity planning tools and the challenges of capacity planning.


DHCS Unveils Enterprise Architecture Plan
The Department of Health Care Services (DHCS) unveiled its enterprise architecture plan, a technology blueprint to make progress on it's nearly $1 billion project portfolio and help implement the Affordable Care Act in California. In a presentation led by DHCS CIO and Deputy Director Chris Cruz, Enterprise Architect Ben Word and Chief Medical Information Officer Dr. Linette Scott, the department laid out it's guiding principles and detailed plans including business, information and technical architectures.


Meta-Decisions: Agreeing on the criteria before discussing the alternatives
In general, the difficulty in reaching an agreement is caused by the fact that different people are forming their opinions using different criteria. Thus, the solution to reduce the time spent in discussions and to make decisions faster is to first agree on the criteria that should be applied when choosing among the several options.


What Managers Can Do To Support Agile Transformation
In a phrase, Agile practices rely on building a collaborative culture. That means the HR department needs to create appropriate teams for the projects at hand, implement fluid systems of engagement versus the more stolid, rigid structures that used to serve organisations well and foster an environment that supports continuous learning at all levels of the enterprise.


3 Lessons From 5 Years Of Federal Data Center Consolidation Delays
Obviously, data center consolidation is more difficult than anyone expected it to be, a reality I've seen firsthand while working on the effort. The problems aren't unique to the public sector. A lack of record keeping and plain old resistance to change are universal human traits. I've learned a few lessons that may help make enterprise data center consolidation efforts more efficient than the feds have thus far been.


Intel unveils Thunderbolt 2
Thunderbolt 2, which had previously only been known by its code name Falcon Ridge, is a reworking of the original Thunderbolt interface to offer 20Gbps of bidirectional transfer rate. ... Thunderbolt made use of four independent 10Gbps channels, two upstream and two downstream, whereas Thunderbolt 2 combines these four channels into two 20Gbps bi-direction channels.



Quote for the day:

"Liberty is the right to do what I like; license, the right to do what you like." -- Bertrand Russell

June 09, 2013

The digital-wallet business is rough — just ask Google
While a decent amount of Android, Blackberry and Windows Phones have NFC enabled in their hardware, only Sprint allows Google Wallet on devices. Having to battle with other carriers, on top of other wallet companies and Apple, with its own forays into Passbook, will further stretch Google Wallet as it struggles to find a steady audience that has access to the product.


SugarSync rolls out remote wipe for PCs and Macs
With the new Remote Wipe feature, both business and individual consumer users can remove all of their synced files. The new tool is also being marketed as a way to make transferring ownership of a computer simpler as all personal or business data stored in the SugarSync cloud can be easily removed and then quickly synced again to a new device.


How to Cultivate a Data Driven Marketing Team
Data: You can’t live with it, and you can’t live without it . At least, that’s how a lot of marketers feel. In fact, the affair between marketers and their data is often somewhat of a love-hate relationship. ... even though data can come with its challenges, successful marketers understand that it’s a necessary evil, and most even learn to love data because it makes them better marketers.


Data breaches caused mostly by negligence and glitches, study finds
Almost two-thirds of data breaches in 2012 could be attributed to negligence or human error (35 percent) and system glitches (29 percent), reported the eighth annual Ponemon Global Cost of a Data Breach study. However, malicious attacks remain the single highest cause of breaches, with 37 percent of the intrusion pie.
Those figures vary by nation, the report showed.


Dell, Oracle form strategic partnership for integrated systems
"We test it together, we patch it together, we support it together," Hurd said. The goal is to free enterprises from integration and maintenance tasks and let IT departments spend more time on internal innovation, Hurd said. "This allows customers to get integrated solutions and support from Dell, with Oracle support backing their entire solution," Hurd said.


Under the covers of the NSA’s big data effort
Yes, the agency has a lot of data and can do some powerful analysis, but, the argument goes, there are strict limits in place around how the agency can use it and who has access. Whether that’s good enough is still an open debate, but here’s what we know about the technology that’s underpinning all that data.


IaaS infringes on acceptance of true PaaS cloud architecture
“PaaS gave us the flexibility to be very nimble as a team, to prototype quickly -- and to throw stuff away if it didn’t work,” said Mario Cruz, Choose Digital’s CTO and cofounder. It meant the company didn’t need to hire dedicated infrastructure and operations staff, and instead could focus on hiring developers. “It’s like having a whole infrastructure team in-house, without actually having an infrastructure team,” Cruz said.


Managing the people side of risk
The cultural differences between companies that acknowledge risk and those that do not are quite stark. ... The best cultures actively seek information about and insight into risk by making it everyone’s responsibility to flag potential issues. ... In the best of cases, respect for rules can be a powerful source of competitive advantage.


Beginner's guide to R: Introduction
Because it's a programmable environment that uses command-line scripting, you can store a series of complex data-analysis steps in R. That lets you re-use your analysis work on similar data more easily than if you were using a point-and-click interface, notes Hadley Wickham, author of several popular R packages and chief scientist with RStudio.


The 90 Minute Guide to Agile – What, Why, How
Allan Kelly, the author of 'Business Patterns for Software Developers' (2012) and 'Changing Software Development: Learning to become Agile' (2008) and also the originator of Retrospective Dialogue Sheets, explains What Agile is, Why companies are adopting it in increasing numbers and How it works, providing suggestions on how to start an Agile initiative and how to do things right.



Quote for the day:

"Those who hate you don't win unless you hate them, and then you destroy yourself." -- Richard M. Nixon

June 08, 2013

ZTE sends 400Gbps over 3,100 miles
While a growing number of operators are upgrading to 100Gbps-links, vendors such as ZTE are preparing for the next step. The company's 400Gbps test was conducted on a WDM (Wavelength-Division Multiplexing) system using single-mode fiber, which is what is currently used for data transmissions over long distances, said Magnus Isaksson, ZTE CTO in the Nordic countries.


Big data analytics: New patterns emerge for security
Intelligence-driven security fueled by big data analytics will disrupt several infosec product segments in the next two years, according to executives at RSA, the security division of EMC. “With the pervasiveness of big data touching everything we do,” said Arthur Coviello, Jr., EMC executive vice president and chairman of the RSA security division, during his RSA keynote in February, “our attack surface is about to be altered and expand, and our risks magnified in ways that we couldn’t have imagined.”


A Futurist's Take on Managing Big Data and Disruptive Technology
Indeed, people have been making the argument that it’s extremely hard to manage technology futures. “But it’s not,” he said. “We’ve been doing it.” IT executives have, in just the last three decades, jumped from the mainframe era, to the PC era, to the client-server era, to the Internet enterprise software era of today. What trips up IT, he said, is focusing on the wrong thing. IT often talks about buying new technology. But, he said, “organizations don’t buy technology. They buy the benefits technology enables.”


Look for Innovation From the Edge
Edges are powerful sources of business innovation because they are places of potential and friction, where traditional products and practices are no longer adequate to address unmet needs or unexploited potential. Much tinkering and experimentation occurs on the edge, as well as heated debate about the most promising options to address emerging needs, intensified by the diverse backgrounds, skill sets, and perspectives of participants gathering on the edge.


Using Power to Empower
Empowering for Ann is: Preparing those who report to her to anticipate and be ready to answer the toughest questions partners or senior executives might ask so thoroughly and accurately that they do not need to go to Ann. Three benefits occur—the recipients’ questions and issues are resolved, they believe that Ann is doing a great job developing her people and Ann has freed up time to concentrate on strategy with peers and partners.


Facebook's first data center DRENCHED by ACTUAL CLOUD
"I got a call, 'Jay, there's a cloud in the data center'," Parikh says. "'What do you mean, outside?'. 'No, inside'." There was panic. "It was raining in the datacenter," he explains. The problem occurred because of the ambitious chiller-less air conditioning system the data center used. Unlike traditional facilities, which use electricity-intensive, direct-expansion cooling units to maintain a low, steady temperature, consumer internet giants such as Google, Facebook, and others have all been on a tear building facilities that use outside air instead.


Facebook's React JavaScript User Interfaces Library Receives Mixed Reviews
Following the recent trend of frameworks like AngularJS, MeteorJS and Model-Driven Views as implemented in Polymer, React is based on the idea of declaratively specifying user interfaces on top of a data model, where user interfaces automatically keep themselves in sync with underlying data. Unlike the aforementioned frameworks, React uses JavaScript rather than HTML to construct those user interfaces, citing flexibility as the reason for this design decision.


Free Google Drive Tools You're Not Using (But Should Be)
But like Google's Chrome browser, Google Drive becomes even more useful when you take advantage of third-party add-ons and services. These five totally free and easy-to-use tools will help you to encrypt your data, play your music, collaborate on slides, back up automatically, share files, and more. Some live on the desktop, some in Chrome, and some online, but all of them work to make Google Drive a happier online home for your data.


A Humble Indian Start-Up Features In Gartner Cool Vendors List
In the list announced for the year 2013, towards the end of April 2013, sharing the spotlight among the rest is a humble Pune based, Indian Start-Up, Qualitia – A Script-less Test Automation Platform. ... Qualitia is an easy yet powerful script less functional test automation platform for all leading test automation tools like QTP, RFT, Selenium and Web Driver.


Using enterprise architecture principles to facilitate SOA governance
While EA methodologies like TOGAF have been adapted to embrace SOA, few enterprises actually map business needs directly to SOA components. This mapping is the most important step in both securing EA benefits and starting SOA governance on the right footing. Enterprises report that the critical issue at this point is a failure to align SOA components with EA-defined processes.



Quote for the day:

"We don't have as many managers as we should, but we would rather have too few than too many." -- Larry Page

June 07, 2013

Cross-cutting concerns may be the next big step for IT
Cross-cuts go beyond standardization. Look at how data centers now use system virtualization, point-in-time storage snapshots and software version control systems. In the last ten years, they've massively overflowed their original banks and come to underpin broad swaths of how apps and services are developed, delivered, deployed and managed. And that's been a very good and helpful thing.


PWC finds IT & Business as Complementary Factors
Notwithstanding the unprecedented changes, the need to navigate through pitfalls and disruptions, businesses are striving to achieve the core objectives of fostering growth, meeting disparate consumer needs, reaching out to markets, compete and succeed. In such times, speeding up the adoption of key technologies like social networks, mobile computing, analytics, cloud computing (SMAC) and other emerging technologies will transform businesses and accelerate wealth creation, especially in the emerging markets economies


Managing and Retaining Data: Top Priority for CPAs
Data is growing at an estimated 50% per year and companies generally have access to that information on a real-time basis through the web and social network traffic, emails, voice mails, videos and data generated by software and sensors used in industrial processes. Advances in computer processing and information technology have made it possible for companies to take a large amount of data, quantify it, analyze it and use it for a variety of purposes.


VMware HA and DRS Capacity Planning
Although DRS and HA are completely independent processes, they can complement each other to create a robust, automated recovery mechanism for the virtualization platform. This paper is intended for VMware and Kingston partners, resellers, and customers who want to implement VI3 in production scenarios and want to proactively plan for physical memory requirements.


US gov defends NSA surveillance, slams 'reprehensible' journalists
Under FISA, Clapper says that Section 702 -- which is designed to gather data on non-U.S. persons residing outside of the United States -- was "recently reauthorized by Congress after extensive hearings and debate." The defence chief says that the order "cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States."


What Is Insight? Is It Visual?
Analytic logic: did you run through a series of possible matching words until you found the right association? For example, saying: “Does ‘cake’ work? No. Does ‘cone’ work? No. Does ‘tree’ work? No. Does ‘apple’ work? Yes.” Unconscious Insight: did you have a moment of pure insight, where your brain leapt to the right answer? You somehow just knew it, with no conscious thought process?


IT Departments Won't Exist in 5 Years
"Interns coming in for the summer are asked if they're familiar with Google Apps. They say, 'Of course we are,'" said Nathan McBride, vice president of IT & chief cloud architect at AMAG Pharmaceuticals. "Then we have other employees coming in who worked for other companies who say, 'I need Outlook.' We have to say we don't use that anymore."


The age of the 'recycled CEO'
Recycled CEOs don't always work out -- the late Kenneth Lay being a major case in point. He was brought back to revive Enron after a brief stint under Jeffrey Skilling's leadership. That ended badly. A different, but embarrassing, scenario beset Xerox (XRX), when nine-year veteran CEO Paul Allaire was called back by the board in 2000 for a stint.


Providers struggle to turn a profit with current cloud pricing model
Aspiring cloud providers should identify a specific market to sell to before launching a cloud business, Nolle said. "Going out and launching IaaS with no idea of who [the providers] plan on selling to, and no idea what the value proposition will be for the purchase of their [services] is not doing it right," he said.


Creating Resilient Software with Akka
Let’s face it: failure does happen. No matter how hard you try, there is always one more case which you did not foresee and which your testing did not reveal. The question is thus not “how can I avoid failure”, it is “how do I deal with it”. Resilience is defined by Oxford Dictionaries as: the ability of a substance or object to spring back into shape; elasticity; and the capacity to recover quickly from difficulties, toughness


Quote for the day:

"Striving for excellence motivates you; striving for perfection is demoralizing." -- Harriet Braiker

June 06, 2013

Rethink Cloud Security to get Ahead of the Risk Curve
Ever since the cloud sprung up to the top of every IT discussion, the issue of cloud security was right alongside it. Let’s face it, enterprise security has never been easy, and the rapidly expanding use of software in the cloud has added layers of complexity – and risk – to the job. More valuable intellectual property, personally identifiable information, medical records and customer data now sit in the cloud. Risk should not prevent this, but it’s a risk that needs to be managed.


Tactical and strategic health care CIO drives through industry turmoil
Finalist Deanna Wise is CIO and executive vice president at San Francisco-based Dignity Health, the nation's fifth largest health system with 40 acute care hospitals and more than 150 ancillary care sites. A model example of a tactical and strategic CIO, she has led IT and Dignity Health through a period of rapid change by striking an impressive balance between delivering consistent, reliable IT services and breaking new technology ground.


Bank of America CIO on Big Data, Emerging Enterprise Tech
Rather than Big Data, she would prefer to just use the term "data." Despite the overhyping and haziness of the phrase, Big Data is important to $2.2 trillion-asset Bank of America, which has been using data analysis to examine customers' branch visits, calls to the call center, chat sessions, and online banking sessions to get a full view of customer behavior.


Queensland's open data push goes 'global'
Essentially, Queensland Globe is a free application that lets users apply state government data to Google Earth satellite images. Some of the data sets integrated carry information about land tenure status, property and electoral boundaries, and areas affected by floods. But the Premier said the program also included topographical maps and aerial photography that was “a step above” Google Earth.


The Usefulness of Useless Knowledge
In The Usefulness of Useless Knowledge, originally published in the October 1939 issue of Harper’s, American educator Abraham Flexner explores this dangerous tendency to forgo pure curiosity in favor of pragmatism — in science, in education, and in human thought at large — to deliver a poignant critique of the motives encouraged in young minds, contrasting those with the drivers that motivated some of history’s most landmark discoveries.


Cisco Betters its Best-Selling Catalyst Ethernet Switch
Per-port power consumption on the Catalyst 2960-X is 0.9 watts, vs. 2 watts on the 2960-S/SF. Energy efficiency is achieved through support of the IEEE's Energy Efficient Ethernet standard, as well as Cisco's own EnergyWise software. The switches can engage in two modes of "hibernation" during downtime: downlink mode, which powers down less active links; and switch mode, which powers down the switch itself.


Businesses ignore early warning signs of hacking: NAB
There is enough information for organisations to be able to determine whether a form, which could take a user a few seconds to fill out, is actually being submitted in a fraction of a second. Similarly, given that the information submitted in a query should match the form's elements, including their order, any variance to these could give organisations an early warning that someone is planning an attack or performing reconnaissance on their systems.


Microsoft, FBI crack cybercrime ring
"The harm done by Citadel shows the threat that botnets, malicious software, and piracy pose to individuals and businesses around the world," said Brad Smith, Microsoft general counsel and executive vice president, Legal and Corporate Affairs. "Today's coordinated action between the private sector and law enforcement demonstrates the power of combined legal and technical expertise and we're going to continue to work together to help put these cybercriminals out of business."


100 Columns and Counting: Gary Cokins on His Life in Analytics
"My observation is that although it is ideal to have executive sponsorship for new projects and methods, often executives are distracted with fire-fighting and short-term priorities. I enjoy empowering champions who want to improve their organizations. I have seen the successful outcome of EPM systems I have helped implement with substantial tangible results. I get pleasure knowing I made an impact. "


IPv6 in action: How Mythic Beasts does it
RFC1883, the document that describes IPv6, was written in 1995. It was the next big thing on the Internet. Google records how many IPv6 requests come in and last year the total reached the dizzying heights of 1%! After most of two decades, one in a hundred Google requests are not IPv4. You couldn’t really say IPv6 is taking off like a rocket. That’s all going to change in the next few years. Cisco reckon IPv6 takeup will hit 23.9% in 2017.



Quote for the day:

"Everything's in the mind. That's where it all starts. Knowing what you want is the first step toward getting it." -- Mae West

June 05, 2013

Comparing SAN and NAS
Both SANs and NAS are based on open industry-standard network protocols—Fibre Channel for SANs and networking protocols such as TCP/IP for NAS. While SANs support a broad range of applications—including providing storage for NAS appliances—NAS storage is typically limited to applications that access data at the file level. Regardless of their differences, both SANs and NAS play vital roles in today’s enterprises and provide many advantages over traditional server-attached storage implementations.


NFC forecast dims at Gartner
For 2013, NFC-related transactions will make up only 2% of total mobile payment transactions, growing to 5% in 2017, Gartner said. Those percentages translate into about $4.7 billion for NFC-related payments globally in 2013, increasing to about $36 billion in 2017. In the previous Gartner forecast, the 2017 value of NFC payments was expected to reach an estimated $60 billion.


Tiering storage: Best practices to promote efficiency
Tape has always played the role of tier-three storage because of its extraordinarily high capacity and low per-gigabyte cost, while we've recently seen flash SSD suggested as a tier-zero layer because of its super-fast performance, very high cost and comparatively low capacity. In between these layers, we see tier-one storage comprising 15,000 rpm Fibre Channel (FC) or SAS drives and tier two representing lumbering, high-capacity, low-cost SATA arrays.


The Benefits of a Reverse Proxy
A reverse proxy is server component that sits between the internet and your web servers. It accepts HTTP requests, provides various services, and forwards the requests to one or many servers. Having a point at which you can inspect, transform and route HTTP requests before they reach your web servers provides a whole host of benefits. Here are some:


HTTPS is confusing one of the core metadata tools of the Internet: HTTP Referrers. HTTP Referrers disappear when going from HTTPS to HTTP, but, more worryingly, sensitive HTTPS Referrers still get carried when going from HTTPS to HTTPS. Most secure applications aren't aware of where their HTTP Referrers do or don't go. Don't worry though: there's hope. Or at least meta hope.


But despite all the virtual machine (VM) hoopla, not all SQL Server environments should be virtualized. Issues around licensing, performance, availability and support must be considered before SQL Server can be committed to a virtual environment. Failure to do so could result in a substandard production environment that wears the VM label proudly but fails to deliver on the VM promise.


Windows Phone to overtake the iPhone? It will happen.
A new Canalys report says that by 2017, the iPhone will have a 14.1 percent market share, with Windows Phone nipping at its heels, with a 12.7% share. In 2012, the report says, the iPhone had a 19.5% market share, and Windows Phone a 2.4 percent market share. Android dominates now and will dominate in the future, with a 67.7 percent market share in 2012, and a 67.1 percent market share in 2017.


Dell Challenges Cisco, HP With Converged Infrastructure Lineup
Dell on Tuesday unveiled an expanded range of converged infrastructure products, opening the technology, which Dell had previously pitched to large enterprises, to new classes of customers. Designed to simplify daily IT tasks and enable companies to more rapidly provision and deploy virtual machines, the offerings not only combine storage, networking, and computing into a single chassis but also bring all components under the control of a single management console.


Mobile and cloud to reduce enterprise costs by $28tn by 2015
The data also reflect a growing trend towards bring-your-own-application (BYOA), which is a huge challenge for IT. According to Ovum’s survey, roughly 50 per cent of those bringing their own tablets or smartphones to work are doing so without the knowledge of their IT departments. “IT needs to get on board or risk losing out,” said Adrian Drury, practice leader of consumer impact IT at Ovum.


Five web-based network troubleshooting tools
Network troubleshooting can run the gamut of possibilities. From hardware to software to external, uncontrollable forces, to powerful Jedi mind tricks. When you’re troubleshooting networking issues, the problem can often point toward many and varied issues. When that happens, you’ll want to have access to tools to help you diagnose the issue. One place to turn for such a tool set is the good old Internet.



Quote for the day:

"The struggle you're in today is developing the strength you need for tomorrow. So don't give up!" -- Annymous

June 04, 2013

10 key questions about software-defined networking (SDN)
The difference is that SDN as a network solution is not nearly as far along as virtualization in the server and storage worlds. Nevertheless, SDN is coming — and the more IT decision-makers and business leaders know about it, the better they'll be able to determine where and when to introduce it to their data centers. Here are 10 of the questions they're asking about SDN.


How To: Component Licensing in .NET
.NET has a built-in licensing system that is very useful, although without modifying the default implementations or the provided license provider (LicFileLicenseProvider), its almost comically easy to break. The LicFileLicenseProvidersimply holds a license file that has the full type name and version in a text file. If the text file contains this text, then the component is licensed.


Innovation is a leap of faith, says former Corning CEO
'We don't know what's going to happen but if you spend money on research, something good will happen and therefore it's worth doing. Take fiber optics. The original concept - that you could communicate with light by taking a certain amount of energy and put it into the threads of glass fiber - had been around for a long time but a small group of Corning scientists started working on the problem in the 1960s by trying to develop incredibly pure glass.


Next generation Wi-Fi network extends the Fernbank museum experience
"The project started with Joey Shultz, AT&T vice president of marketing and a Fernbank board member, who wanted to provide basic Wi-Fi connectivity in the museum. After seeing Cisco's Connected Mobile Experiences solution, the museum and AT&T realized that the Wi-Fi network could be a much more strategic asset in engaging a museum guest," according to Doug Webster, vice president of networking solutions marketing for Cisco.


SQL Server 2012 PDW: Game on!
There is a great deal of activity around SQL Server 2012 Parallel Data Warehouse. As of March 1st, you can order what was previously known as “PDW V2″. This post will be pointers to several other pages and posts providing good information on the product. The SQL Server PDW landing page has been updated with information around the 2012 product.


Microsoft Announces SQL Server 2014
A key feature of SQL Server 2014 is the incorporation of in-memory, online transaction processing (OLTP) technology stemming from a project that has been in the works for several years, codenamed "Hekaton," Clark said. Developed in conjunction with Microsoft Research, Hekaton greatly improves transaction processing speeds and reduces latency by virtue of working with in-memory data, as opposed to disk-based data.


Insurers Raise Their Voices on Mobile Tech
Customer demand can’t be underestimated, even if it means establishing an entirely new platform to accommodate that demand. Such is the case with interactive voice assistant (IVA) technology, and a couple of notable insurers are leading the way. When Geico, a Berkshire Hathaway Inc. company, discovered that two in five of its existing customers already had voice recognition technology resident on their smartphones, it moved quickly to establish a way for those customers ...


Intel's new fourth-gen 'Haswell' processors: What you need to know (FAQ)
Intel has officially revealed its next-generation lineup of desktop and mobile processors in the Core i3, i5 and i7 family, also known as "fourth-generation" or code-named "Haswell." The two-part announcement started over the weekend with Intel's quad-core enthusiast-level processors, and now the veil has been lifted on dual-core desktop and mobile processors, too. This FAQ will mainly focus on the dual-core processors and what they'll do for mobile systems.


IBM shows off nickel-sized chip that backs Gb/sec wireless data-rates, cutting edge radar images
The integrated circuit takes advantage of millimeter-wave spectrum which spans the 30 GHz to 300 GHz range, 10 to 100 times higher than the frequencies used for mobile phones and Wi-Fi. Frequencies in the range of 90-94GHz are well suited for short and long range, high-resolution radar imaging, IBM said.


Black Hat: It only takes a minute to hack an iPhone
They discovered how the capabilities of the USB standard as used in the charger can be used in such a way as to bypass Apple's own built-in protections against arbitrary software installation. The researchers then built a compromised charger as a proof of concept of their findings. Dubbed, "Mactans", this charger was built using a BeagleBoard.



Quote for the day:

"Experience is a hard teacher because she gives the test first, the lesson afterwards" -- Vernon Sanders Law