November 17, 2013

What to Use on the Microsoft Stack
Recently there has been a lot of flux in the Microsoft stack, leaving developers and leads wondering which technologies they should focus on. Microsoft's unwillingness to officially deprecate technologies such as Silverlight, instead allowing them to slowly fade away, only compounds the confusion. One way to find out is to review a little known document called the ".NET Technology Guide for Business Applications". Released earlier this year, the Guide offers insight into where Microsoft intends to put its efforts and what technologies should be avoided.


How to Create an Effective Business Continuity Plan
Because restoring IT is critical for most companies, numerous disaster recovery solutions are available. You can rely on IT to implement those solutions. But what about the rest of your business functions? Your company's future depends on your people and processes. Being able to handle any incident effectively can have a positive effect on your company's reputation and market value, and it can increase customer confidence.


Steve Jobs On Android Founder Andy Rubin: 'Big, Arrogant ..."
Steve Jobs did not like Android, or the guy that ran it, Andy Rubin, according to a new book on the Google-Apple smartphone wars. ... "It got incredibly personal," says one Apple executive who was briefed by Jobs on the meeting. "Jobs said that Rubin was steamed, telling him his position was anti-innovation. And this is where Steve was demeaning to Andy, saying Andy was trying to be like him, look like him, have the same haircut, the same glasses, the same style."


HTML5 & CSS: Animated Opening Type
"In this tutorial I’m going to explain how to achieve an interesting 3D opening type effect with CSS based on the one I previously created. My experiment was actually inspired by Edenspiekermann’s Open Type project for the Kröller-Müller Museum, a dynamic concept that plays with light and shadow in a simple but incredibly creative way. The aim of this tutorial is to show how we can bring some life to letters using CSS transforms and transitions on pseudo-elements with a technique that will allow to open a letter from all four sides."


It's Too Late for Data Governance
Get buy-in across the organization on definitions so the element that is quantified here is actually the same thing as the one quantified there. That way, individuals who create local models can be assured they are comparing apples to apples and benchmarks are meaningful instead of confusing. Attention to detail and cross-department accord are necessary. Be prepared to spend a fair amount of time here.


The interplay between data management and data governance
Inevitably, firms will need the right tools for this practice, and effective data management solutions are the essential foundation on which to build data governance. These systems have already delivered exemplary levels of transparency, visibility and highly granular control over data consumption and distribution, and enable organizations to embed data management disciplines into formal technology practice. Usage and change management functions ensure that data governance benefits the organization by enabling cost control, cost allocation and contractual compliance.


Cisco claims scuttled by VMware
In criticizing software-only overlays for network virtualization, two points Cisco continually brings up are hypervisor dependency and the need to touch all endpoints when network changes are made. But VMware, the chief target of Cisco's criticism, takes issue with both counts. With the first, VMware's NSX software is installed in many multi-hypervisor hybrid environments and some with non-VMware hypervisors, says Martin Casado


Introducing Enhanced Mitigation Experience Toolkit (EMET) 4.1
EMET anticipates the most common techniques adversaries might use and shields computer systems against those security threats. EMET uses security mitigation technologies such as Data Execution Prevention (DEP), Mandatory Address Space Layout Randomization (ASLR), Structured Exception Handler Overwrite Protection (SEHOP), Export Address Table Access Filtering (EAF), Anti-ROP, and SSL/TLS Certificate Trust Pinning, to help protect computer systems from new or undiscovered threats.


Strategic Risk—Five Frequently Asked Questions
Companies that fall behind on the innovation curve may soon find themselves facing innovation’s evil twin: disruption. Those that do not actively manage strategic risk—as well as evolve with new technologies and plug into external sources to gain an “outside-in” perspective—are more likely to be victimized by the future than being a part of shaping it. Strategic risk analysis can help a company control its own destiny by surfacing the pitfalls and the opportunities that lie within their business strategy.


OAuth as Single Sign On
"Today, we're announcing the release of a key part of our authentication infrastructure - id.heroku.com - under the MIT license. This is the service that accepts passwords on login and manages all things OAuth for our API. The repo is now world-readable at https://github.com/heroku/identity . Pull requests welcome. While OAuth was originally designed to allow service providers to delegate some access on behalf of a customer to a third party, and we do use it that way too, Heroku also uses OAuth for SSO. We'd like to take this opportunity to provide a technical overview."



Quote for the day:

"The truth can make people angrier than a lie. Tell it anyway." -- Teresa Carpenter

November 16, 2013

Big Data Has A Trust Problem
One of the report's most interesting findings is that a "trust gap" exists within organizations. According to Kathy Reece, a business analytics leader at IBM Global Business Services, and one of the authors of the study, less than 47 percent of leaders surveyed report a "strong level of trust" between IT and business departments. And when it comes to the C-Suite, the trust gap is even worse: Just 40 percent of respondents feel a strong sense of trust between executives at their firm.


Splunk and Ford Test Drive Open Data Development in Connected Cars
"The Connected Car Dashboards give a glimpse into a promising future in which data could transform vehicle and driver safety as well as design, productivity and other areas of the automotive industry," said Christy Wilson, vice president of product operations, Splunk. "Splunk's mission is to make machine data more accessible, valuable and usable to everyone, and Splunk4Good extends those goals by using data to make a difference. Splunk is thrilled to be working with Ford to help usher in an open data movement in the automotive industry."


Gartner Says the Natural Life Cycle of a Technology-Driven Company Is Under 10 Years
“To compete in this environment business leaders must destroy and rebuild the very businesses they helped create,” said Mr. Prentice. “Nokia’s metamorphosis is an example of embracing the concept of destruction and reinvention, while the current business model still remains successful. The divestiture of IBM Personal Systems Group to Lenovo and subsequent changes of company’s focus is another example. Apple is another company which almost came to extinction several times over its life, and then dominated the next technology wave through significant changes to its operations.”


How to survive in the cloud storage market
The large providers share the same blind spots that plague the component makers of any market: poor end-user support, zero customization, minimum feature sets, minimal to no service-level agreements, or abysmally complex billing and provisioning systems. The opportunities in cloud lie in value-add. There is a rich ecosystem forming above the so-called raw cloud service providers, and there is plenty of opportunity there.


Statistical analysis made easy in Python with SciPy and pandas DataFrames
The majority of data analysis in Python can be performed with the SciPy module. SciPy provides a plethora of statistical functions and tests that will handle the majority of your analytical needs. ... The pandas module provides powerful, efficient, R-like DataFrame objects capable of calculating statistics en masse on the entire DataFrame. DataFrames are useful for when you need to compute statistics over multiple replicate runs.


A Recipe for the Internet of Things
Seemingly every day a new story pops up about the Internet of Things, as new devices and wearables are launched into the market, and large enterprises contemplate the possibilities of a connected world. I’ve spent quite a bit of time discussing the requirements for taking advantage of these capabilities with organizations ranging from automobile manufacturers, to consumer electronics manufacturers, to industrial manufacturers, to city governments.


Open Source: A Platform for Innovation
The beauty of open source is that it’s a huge ecosystem of innovators who are no longer competing for scarce resources but rather sharing knowledge with others to create new resources and opportunities for others to benefit from these resources. The programs that have been developed in the open source software community are enablers for researchers to more effectively analyze the data in their endeavors regardless of their application. The software and hardware developed by open source can have applications beyond the data center.


EMC finally gets into the all-flash game with first XtremIO units
The initial XtremeIO SKUS are 10TB boxes, with capacity to double in the first quarter of next year, according to EMC. Basically this is the technology EMC purchased with XtremIO but with added linkages back into the rest of its product stable with “integration points” to vPlex, PowerPath, vBlocks and Secure Remote Systems and VMware vCenter (via plugins).


The strange life, death and rebirth of the CIO and what it means for the future of IT
CIOs now face a series of contradictory demands, according to Lee Weldon, research director at analyst Gartner. After years of being asked to increase efficiency and reduce costs thanks to a tough economic climate, they're also being asked to come up with new ways of using technology to create new business opportunities: "The CIO is getting hit with these conflicting expectations. That's a real pressure that they are feeling," says Weldon.


Virtualization security dynamics get old
Frankly, the ability to provide risk-driven and well-adjusted security and compliance capabilities in virtualized environments has a lot to do with a reasoned understanding of the applications and information we need to protect. That entails appropriately factoring in threat models and business impact; adjusting architecture and approach; and aligning operational and technical implications. Virtualization and cloud are simply operational and deployment variables which factor into these equations.



Quote for the day:

"When nobody around you measures up, it's time to check your yardstick." -- Bill Lemly

November 15, 2013

Rackspace: Biggest cloud risk for CIOs is being blind to potential
"I'll bet you, the first thing they wouldn't have thought of is 'wow this gives me lighting, what can I do with lighting?' That's a game changer but they wouldn't have seen it initially." CIOs will need to challenge themselves by constantly asking what they were not seeing today that might be made possible with the technology, noted Perkins, who is also Rackspace's director of technology and products for Asia-Pacific.


The essential value of EA
As the blueprint of the enterprise, the value of EA would be calculated at stakeholders, the users of EA. In fact, the value of any product stems from its usage. Hence, there is no value in EA if there is no proper EA or no stakeholder to employ it. A such beware that the cost of EA could be much greater than the value  returned. But there is plenty of value if all stakeholders in the enterprise use the EA to enhance their own work.


The New Best-Practices of a High-Impact Learning Organization
Some key findings of the enduring research,The High-Impact Learning Organization are: First, the research shows very clearly that companies with High-Impact Learning Organizations outperform their peers. ... Second, the research shows a distinct shift away from a pure focus on "training programs" to a focus on "organizational capability development." ... Third, the research shows that the L&D industry needs reskilling itself.


What Optional Services Should you Consider to Support your SaaS Applications? (Part 2)
One of the limits to SaaS adoption is that they are stovepipes in and of themselves. For greater functionality, companies need to integrate Cloud SaaS applications together or with applications deployed in-house. For example, it would be very productive if, when a sales rep in a CRM system marks an opportunity as won, the order administration application automatically gathers the required data, schedules the order for production and alerts the financial systems. This is only possible if the applications have been integrated.


Panelists debate the use of “Big Data” in modern technology
The conversation became heated as the panel and the contributing audience members debated if the use of Big Data can do more harm than good to users. “Big Data gives insight into existing things that we have lying around. So as long as you have a data log of things people are doing on your website, it’s pretty powerful,” Garcia said. “The NSA wiretapping shocked many people, but as a consumer you should be aware that everything you’re doing is being tracked by someone, somewhere. That’s just the age we live in.”


November Update of Power Query Preview is Now Available
This is the most substantial update we’ve had in a while, and we are excited about bringing it to you – the theme on this blog a short while ago was Halloween, and we think of this as Christmas arriving early  The new features included in this month’s update range from new data sources to improved experiences and new capabilities for importing, reshaping, combining, managing or sharing your queries. Pretty much every product area has been improved this month, in one way or another. You can find more details below:


Is Pivotal’s Cloud Foundry PaaS viable?
Pivotal’s “secret sauce” is the ability to abstract out the differences within the underlying infrastructure in such a way that once the application is built and deployed, they can move between cloud providers. However, this comes at the price of being dependent upon Cloud Foundry itself, including current support from CenturyLink/Savvis, ActiveState, Tier 3, and other providers.


SQL Server 2014 In-Memory OLTP: Memory Management for Memory-Optimized Tables
It is the responsibility of DBAs/Administrators to make sure resources are provisioned and managed appropriately to avoid such failures. SQL Server provides a rich set of monitoring tools, including DMVs, PerfMon and XEvents to help administrators identify problems earlier so that a corrective action can be taken. Similarly, for memory-optimized tables, SQL Server provides a rich set of monitoring capabilities and configuration options so that you can manage your database/instance well and keep your application running smoothly.


IBM big data portfolio adds operational pieces
While the high-profile Watson cognitive system and Smarter Cities projects help IBM showcase new styles of big data analytics, the company is also rolling out low-profile big data portfolio enhancements to better enable use of new data technologies in the enterprise. Some of these enhancements help data professionals protect the security of their big data assets.


Evaluation Criteria for Data Governance Tools
This list of evaluation criteria for data governance software tools will help you in your technology assessment. Sunil Soares, industry thought leader and founder and managing partner of Information Asset, LLC, compiled a list of 18 evaluation criteria for data governance software tools, which he presented at the recent MDM and Data Governance Summit in New York.



Quote for the day:

"There are winners, there are losers and there are people who have not yet learned how to win." -- Les Brown

November 14, 2013

Five steps to choosing the best hypervisor for your company
Most agree that, up until recently, VMware was the obvious leader in providing advanced virtualization features. However, with the release of Windows Server 2012 Hyper-V, many believe that Microsoft has stepped up its game, providing features equivalent to the ones VMware is known for. Because of these recent advancements, it's a better time than ever to select a hypervisor for the data center because you have more competitive choices to consider.


IBM to offer Watson supercomputer as cloud development platform
IBM is preparing to give third parties access to its Watson supercomputer with the aim of spurring the growth of applications that take advantage of the system's artificial intelligence capabilities. Watson, which is derived from IBM's DeepQA project, drew worldwide attention in 2011 after it soundly defeated human opponents on the Jeopardy! game show. IBM has been applying Watson's machine learning -- or "cognitive computing" -- technology to domains such as health care, but now the company is ready to share Watson with the broader world.


Eight Ways to Stay Calm in the Midst of Chaos
Everyone dreams of a company that runs smoothly and efficiently, but ambitious entrepreneurs, managers and salespeople can’t help but push for speed. Rather than slow down on a product release or turn down a customer or two until processes are ready, decisions are made that tax resources and send teams into a frenzy. Whether you are the chaos creator or just caught in the fray, the best way you can bring sanity back to your team is to be an island of stability. It’s harder than it sounds when people are running and screaming with their hair on fire, so here are eight tips for smooth sailing.


Virtustream Accelerates Hybrid Cloud Security and Compliance with Intel® TXT
“Virtustream's partnership with Intel has been built on our common belief that enterprise class clouds must closely integrate software and hardware to give our clients the most advanced security features and compliance capabilities which reduce risk and costs,” said Kevin Reid, CEO and CTO of Virtustream. “By integrating Intel TXT, Virtustream’s xStream moves several steps ahead of any other hybrid cloud solution. The combination of application-level SLAs and security compliance gives our customers a tremendous advantage and new options for how they can deploy business-critical applications in the cloud.”


Isis NFC mobile wallet goes live across the US
"The redesigned Isis Mobile Wallet features a simplified user interface with a clean, white background and easy-to-navigate toolbars," Isis says. "Integration with American Express Serve makes it convenient for Isis Mobile Wallet users to load funds to their American Express Serve account from a US debit or credit card, bank account, or through direct deposit, as well as pay bills online and send money to friends and family using an American Express Serve account."


Security as a Service enlists one cloud to monitor others
Security as a Service is a ripe market for new approaches from emerging companies. One such company, JumpCloud, hopes to snare customers looking for a one-stop Security as a Service monitoring shop. Its agent-based software handles intrusion detection and prevention, data loss prevention, and identity and access management with integrations into Active Directory.


10 mistakes CIOs should not make
There is probably no more difficult C-level position in any company than that of the CIO. So much can go wrong with technology projects, and also with enterprise acceptance of them. One area CIOs think about, especially when work is not going well, is what they could have done differently. There is natural tendency to “step in” to make everything “right.” But before you do that, think again. Here are ten things CIOs should avoid!


Where Does Your Chief Data Officer Work? Three Organizational Models
Don’t get me wrong. The CIO isn’t going anywhere. Bringing on a CDO or adding new authoritative supporting roles should not be a replacement for a CIO, or any other C-level position for that matter. The CDO should be an enhancement to the existing organizational structure and complement the positions that are already working hard to drive the business forward.


Firms are still unprepared for consumerised IT management
“There’s a conflict here between the 63 per cent of people who said they are going to deploy a self-service, enterprise app store within the next two years and the small number who have a management plan to go with it,” Littleson told IT Pro. “Software is a very expensive asset that needs to be constantly managed, not just to make sure you have enough licenses, but also that you don’t have too many, for example,” he added


Virtualized environments. Real risk
Because virtual machines run on a hypervisor, having access to the virtual infrastructure really gives you the 'master key' to everything in the datacenter. You get a significant concentration of risk, and there is no video camera watching what you're doing. In the virtual world, administrators don't even need access to the VM. It's easy for them to take a snapshot, copy the snapshot elsewhere and spin up a copy of the VM and/or modify the disk image to inject new users and passwords.



Quote for the day:

"The best strategy for building a competitive organization is to help individuals become more of who they are." -- Marcus Buckingham

November 13, 2013

BIAN and The Open Group launch practical guide to enterprise architecture in banking
The Banking Industry Architecture Network (BIAN) and The Open Group (TOGAF) today launch their latest collaborative whitepaper, detailing how banking industry architects can make use of both the BIAN Service Landscape and The Open Group Architecture Framework in order to accelerate their work to drive transformational change across the industry, improving the quality and consistency of the architecture products they deliver.


Chief digital officer: An insider's take – what CDOs do and why they matter
"Chief product officer, CDO, global head of digital products — so most of them equate to my current role and were product-oriented with overall product responsibilities, including technology," Gallagher. However, he sees organisations recruiting CDOs from a wide range of business backgrounds. "It probably splits right down the middle. I see a lot of chief digital officers are from technology or what I call higher technology product roles," Gallagher said.


Microsoft Sees Huge Potential in Fuel Cells
"Fuel cells are very clean, reliable and perfect for small form factor applications," wrote James. "By integrating fuel cells with IT hardware, we can cut much of the power electronics out of the conventional fuel cell system. What we are left with is a very simple and low cost data center and fuel cell system." Technical issues, such as the fuel distribution system, power management and even safety training, remain to be resolved, he notes.


Why Bill Gates doesn’t fear internet “balkanization”
“I think there’s a lot of forces that, when anything tries to separate off, bring it back together,” Bill Gates said. “Like in mobile phones, they tried to have their own way of doing things and that became part of one internet…. I’d say the forces of unification are stronger today – you know, video journals, how you socialize – and every device you pick up really is just connecting into the internet.”


UML 2.5: Do You Even Care?
The goal of UML 2.5 is to simplify and clarify a specification document so as to reduce implementation problems and promote interoperability between tools. There was a significant pushback against UML v2.0 due to its complexity, so simplification is a step in the right direction. One of UML's complexities is the addition of diagrams that seem to have little value for most practitioners.


How to Boost Windows 8 Performance
A little-known tool called the Resource Monitor does a very good job of tracking down performance problems and fixing them. Although it's not new -- it's been included in Windows since Vista -- it's still a great way to find out about the resources your system uses and to see what applications and services are making the most use of your system. Based on that, you can decide which apps and services to shut down and which to keep running.


Computing 2113: Five Predictions For The Next Tech Century
The excitement at OpenWorldsurrounding the announcement of Oracle’s new SPARC M6-powered SuperCluster M6-32 got me thinking about just how far computational hardware has come in the past 25 years. This, in turn, got me wondering about the advances that lie ahead. ... Here’s my personal list of predictions, synthesized from the expert technical observations in the Proceedings’ papers


How does Lean process improvement work with Agile project management?
Many organizations pick and choose which Lean practices to keep and which to ignore. They are usually missing some of the practices, and you need them all. When project managers see the full list of Lean process improvement principles and understand what each one means, they tend to see why these practices are useful. These are the core principles of Lean processes:


The Internet of things needs a lot of work
Managing devices is also the biggest worry for Ro McNally, vice president of device technology at Verizon Wireless. It's a challenge both for systems engineering and for the subscriber's experience, she said. Between linking devices, entering passwords, managing home Wi-Fi and dealing with corporate IT departments at work, connected life is already hard for some consumers, Rolston said. "They are network admins, by accident," he said. That's created a business opportunity for someone to take over those tasks as a virtual service, he said.


Discomfort is the key to innovation
What we should be doing instead of creating more comfort about innovation is creating discomfort about the status quo. Nothing generates more energy and enthusiasm for change and new products and services than an impending corporate strategic change, an external threat or a profound market shift. These have the ability to create true discomfort with the status quo. And when the status quo is uncertain, that's the time when innovation can become very appealing.



Quote for the day:

"Always acknowledge a fault. It throws those in authority off their guard and gives you an opportunity to commit more" -- M. Twain

November 12, 2013

Scrum Master: Position or Role?
The Scrum Guide generally describes the Scrum Master role as one of teaching, coaching, facilitating, and removing impediments. And when a Scrum team is new, these things take time. A team new to Scrum tries to follow Scrum by the book and needs someone that can do a lot of teaching, coaching, facilitating and removing impediments. But what happens when the delivery team matures? Teaching lessens. Coaching lessens, though there is still need for coaching around constant improvement.


For information standards in the enterprise, XBRL marks the spot
The value of XBRL lies in its machine-readable reporting format, which details how financial performance and information must be reported to the SEC and investors. XBRL data is highly enriched with standardized mark up, and users can access XBRL information via common desktop applications such as spreadsheets and word processors for competitive comparisons and for internal governance, risk and compliance purposes.


Many IT leaders' top concerns don't jibe with organizations' priorities
“They want to optimize IT but also want to help optimize the business, and sometimes those things are in conflict,” he says. While the results initially troubled Kappelman, upon speaking to IT people and further reflecting, he believes it is natural for the IT leader’s viewpoint to differ from that of the organization in that “IT is an indirect contributor to most corporate objectives – in other words, we don’t directly increase revenue or market share, though we do all these things indirectly by doing great IT.”


How Basic Problem-Solving Skills Can Simplify Complex Tech Issues
Business leaders have categorized the problems confronting them as "complex" since the phrase "business problem" was coined. And those problems are only getting more complex. The pace of technology, new competitive landscapes (e.g. web-based business models), globalization and the general speed at which markets are changing have increased the complexity of business problems and generally reduced the time available to solve them.


The Bridge Pattern in the .NET Framework
The implementor is an interface that defines base functionality for all concrete impelementors. The concrete implementor class or classes implement the implementor interface. The abstraction class provides an interface to the client application independent of the concrete implementor being used. The refined abstraction class extends the abstraction interface.


Security is top concern in 2014 for state CIOs
IT security strategies and tools are at the forefront of discussion around the states Orgeron noted. Not only did security top the list of Priority Strategies, Management Processes and Solutions, but security enhancement tools (such as continuous diagnostic monitoring came in second among Priority Technologies, Applications and Tools. Following closely behind on the top priority list of state CIOs were efforts at consolidation and a continued transition to cloud services, Orgeron said.


Five data recovery utilities
If your hard disk fails and you don't have a valid backup, you will have to resort to a data recovery tool. Brien Posey has five suggestions. "I've lost count of the number of times over the years that I have had friends, family, and even clients contact me because a hard disk failed and no backup of the data exists. In these types of situations the only option is often to use a data recovery utility to try to get back some of the data. This article discusses five such utilities."


An interview with Vasco Duarte and Jason Little on Lean Change Management
Change agents need a “constant stream of high-quality content to support their work” as Vasco Duarte from Happy Melly states. InfoQ did an interview with him on a new publishing business that aims to connect authors with their audience in a sustainable way, and with Jason Little, an author that will be publishing about Lean Change Management.


Beyond Vision Statements: Three Steps to Successful Post-Merger Culture Integration
Newly-merged companies often shortchange cultural integration efforts by taking the traditional first step—the alignment of mission, vision and values—without doing important additional steps or following through and doing the detailed, gritty work that’s needed to back it up and create real change. Yet, cultural integration is crucial to the success of any merger. Failure to achieve it can threaten the outcome of multibillion-dollar transactions.


Designing an effective vulnerability management program for the cloud
Approaching vulnerability management as a comprehensive program instead of a series of disconnected scans allows providers to maintain accurate and current perspectives on overall enterprise security. They are then able to better execute security decisions with lasting and effective results. Balancing the configuration, coordination and communication needs of the provider's vulnerability management program is a thoughtful and measured process necessary for success.



Quote for the day:

"Be clear about your goal but be flexible about the process of achieving it." -- Brian Tracy

November 11, 2013

7 Stages for Effective Data Governance
The data governance structure is formed to ensure that authority to manage data is properly delegated from the senior-most levels, and that parties are held accountable for executing governance policies as required by their respective mandates. This authorization, in turn, is accomplished by instituting processes to understand the cause and effect of poor data in an organization. Then solutions can be developed to correct the problem and a means for monitoring and evaluating the implementation of these solutions can be adopted.


British Spies Reportedly Spoofed Linkedin, Slashdot to Target Network Engineers
Special teams from GCHQ's My Network Operations Centre (MyNOC) division identified key employees doing network maintenance and security at the targeted companies and determined which of them were users of LinkedIn or Slashdot.org. The teams then directed the targeted individuals to fake versions of those sites which contained malicious code designed to install malware on their computers, German magazine Der Spiegel reported based on secret GCHQ documents leaked by former U.S. National Security Agency (NSA) contractor Edward Snowden.


Emotional Intelligence Is critical to Good Leadership
The term, emotional intelligence was coined around 1995 in the popular book, Emotional Intelligence, Why it Can Matter More Than IQ. A Key take away from the book, was the fact that factors such as empathy, self-awareness and self-discipline determine both professional and personal success. In this study, Emotional Intelligence was measured with the Six Seconds Emotional Intelligence Assessment OR SEI.


Portugal Telecom’s High-Concept Green Data Center
The PT facility is built to be sustainable, featuring a rain water collection system (which forms a moat around the data center building), an on-site photovoltaic solar power generation, and a garden with more than 600 trees. Portugal Telecom is seeking Gold LEED certification for the data center building, and LEED Platinum status for the attached office building. Covilhã was chosen for the location because it’s the coldest place in Portugal, with a climate that will allow PT to use fresh air cooling for 99 percent of the year, with chillers expected to be used four days a year.


CryptoLocker is Bad News
For the most part, CryptoLocker is spreading via various phishing campaigns, including some from legitimate businesses, or through phony Federal Express or UPS tracking notifications. Some victims said CryptoLocker has appeared after a separate botnet infection as well. According to Kaspersky’s Costin Raiu, this malware primarily targets users from US and UK, with India, Canada, Australia and France being second-tier targets.


Secure Integration of Convergent Technologies – a Challenge for Open Platform
Open Platform 3.0 is an initiative that will advance The Open Group vision of Boundaryless Information Flow™ by helping enterprises to use them. The survey confirms the value of an open platform to protect users of these technologies from vendor lock-in. It also shows that security is a key concern that must be addressed, that the platform must make the technologies easy to use, and that it must enable them to be used in combination.


Snowden serves up another lesson on insider threats
The latest news sheds a more light on how Snowden managed to lay his hands on what has turned out to be a staggering amount of classified information on the NSA's spying activities around the world and in the U.S. His success in getting access to the documents and spiriting them out of the agency have provoked questions about the NSA's apparent lack of controls for preventing such theft.


Working alone won’t solve our cyber security problems: NICTA’s Dr Jodi Steel
There are no silver bullets. Our adversaries are well organised and well skilled, says Steel. “You can buy malware kits online – and they have 24 hour phone support. You can buy hacking services, botnets by the hour. Yet the organisations that are under attack tend to be disinclined to share information because of embarrassment, reputation or share price – or on the solution side, because of competitive advantage," says Steel.


Embracing the Millennials’ Mind-Set at Work
Millennials are becoming more aware of their rising worth. Coupling their ability to learn quickly with their insistence on having a say, they pack a powerful punch. But rather than complaining, it’s time to embrace millennials for what they can offer, to add experience from older workers to the mix, and to watch innovation explode.


Good Governance: The Role of the Board Chair
In the face of all of these responsibilities today’s board chair has one more important job—prepare the other officers to be a good chair someday. The days of waiting until one is elected chairperson to begin studying the role are over. Board officers should be encouraged to take workshops and study the governance work on the role of board leadership before they decide to accept the chair’s job. Dedicated development of board officers is a missing piece in today’s credit union governance—it may be time to add this to the list.



Quote for the day:

"Luck is a dividend of sweat. The more you sweat, the luckier you get" -- Ray Kroc

November 10, 2013

Gamification – don’t attempt to wear too many hats, (and avoid people who do)
One mistake is to take on people who claim to be expert across a number of areas but in the end are forsaking quality outcomes for a grab at revenue beyond their core skills. Equally, organisations who assume that internal capabilities will suffice are often left with off-the-shelf solutions that look and feel like generic attempts to win the audience over as they lack creative or technical spark.


Cisco Takes Fight to SDNs with Bold Insieme Launch
The Nexus 9000 switches can run in either standalone mode with merchant silicon, or ACI mode, with a combination of merchant and custom Cisco silicon. Merchant silicon on the Insieme Nexus 9000 switches will get you open source, OpenFlow and OpenDaylight controllers, and Cisco's onePK programmability, and other industry understood SDN-friendly hooks like decoupled control and data planes.


XBRL: How to Save a Good Idea from a Bad Implementation
However, the SEC’s XBRL adoption has been marred by the fact that the XBRL filings are not audited like the plain-text filings. As a result, investors and analysts consider the XBRL data to be more error-prone and less reliable than plain-text filings and so they still rely on the ordinary filings. Moreover, some users, such as investors and analysts, are hesitant to switch to XBRL because they lack easy-to-use analysis tools for the data, and they do not want to incur the costs of developing ad-hoc technical solutions


Linking business processes to cloud services and mobile enable them
In the new style of IT I talked about several times already, cloud is only one component of the current IT revolution. The use of mobile devices is another. Increasingly users want to address their information from a tablet or mobile phone. They download applications for that purpose and expect them to deliver all required functions. So, the real question is how we get mobile applications interacting with cloud based services. Rather than talking theory here, let me use an example to illustrate what that means and how it works.


Demand for data experts to double by 2017, say analysts SAS
“The challenge that we are facing is that six out of 10 companies last year had problems hiring the technical skills they needed,” said Karen Price, CEO of e-skills UK. As part of the study, E-skills UK analysed data from IT Jobs Watch to identify the top big data roles and skills that were in demand, splitting them into IT-focused roles and data-focused roles. It found that the top five IT roles in demand were developer, architect, consultant, analyst and administrator.


SQL to Hadoop and back again, Part 1: Basic data interchange techniques
In this series of articles, we'll look at a range of different methods for integration between Apache Hadoop and traditional SQL databases, including simple data exchange methods, live data sharing and exchange between the two systems, and the use of SQL-based layers on top of Apache Hadoop, including HBase and Hive, to act as the method of integration. Here in Part 1, we examine some of the basic architectural aspects of exchanging information and the basic techniques for performing data interchange.


Application Services Meet Up with SDN in the Cloud
F5 Networks, a major vendor of application delivery systems, has created a new architecture to make it easier to provide those services in the age of virtualization and clouds. The Synthesis architecture is based on F5's already shipping BIG-IP hardware and software and its BIG-IQ management system. It makes them easier to license and deploy for applications that may run in an enterprise data center, a public cloud, or both.


What’s the Problem with Mobile HTML5?
Many developers consider performance as HTML5’s main problem, but interviewing a number experts in the field the authors of the report consider it as a false target because performance is automatically improving by new generations of hardware, better JavaScript compilers, the option of using Asm.js, etc.. The main culprit in their opinion has to do with politics, more exactly the fact that the major browser vendors are also mobile OS vendors, interested in channeling applications through their respective app stores.


Why IT Project Governance Is Flawed - And How to Fix It
Enterprise IT projects are massive undertakings for a company, and with every large-scale project, there is inherent risk at many stages. In the current recession, many companies are reluctant to incur risk, which could cost the enterprise millions, even if the successful end-goal is a better, more integrated enterprise system. However, avoiding the enterprise IT project doesn’t eliminate risk; in fact, a well-managed IT project can save companies millions in costs and generate millions in revenues.


Testing professionals: Soft skills are key to success
Competence is the ability to do the right things. Confidence is the belief that the things one does are right. In some jobs, competence may be enough. But when it comes to software quality, Hoffman said, test professionals also need to be confident about the decisions they make. Unfortunately, people usually can't build their own confidence. "I can't see my work with my own eyes," Hoffman pointed out, "because I'm always stuck behind them."



Quote for the day:

"The most successful business people hold onto the old just as long as it's good & grab the new just as soon as it's better" -- Lee Iacocca

November 09, 2013

Saving enterprise-architecture from itself – 2: Personal background
In short, it’s a mess. I’ve written about it extensively, here on this blog and elsewhere, and I won’t bother to go into old ground here: suffice it to say that, in my opinion, the only useful we can do now with all of this IT-centric so-called-’EA’ junk is to strip it right back to the roots, and start again from scratch – it really is that bad. If we don’t do that, they will, increasingly, become far more of a hindrance than a help, for any form of EA – even more of a hindrance than they are already


Webservice Security Standards
SOA adoption is on the rise and Webservices is predominantly used for its implementation. Webservice messages are sent across the network in an XML format defined by the W3C SOAP specification. Webservices have come a long way and has sufficiently matured to offer the required tenets especially on the security domain. In this blog let us have a quick look at the available standards with respect to the security dimensions and look at how the related security requirements are addressed.


Big GRC: Turning Data into Actionable GRC Intelligence
GRC big data clearly allows the organization access to and management over a huge amount of often very sensitive information that although can help create a more risk intelligent organization, also presents numerous data governance challenges, including regulatory compliance and information security. In addition to client and regulatory demands over better information security and data protection the sheer amount of information organizations deal with the need to quickly access, classify, protect and manage that information can quickly become a key issue from a legal, as well as technical or operational standpoint.


Why Converged Communications?
From a business perspective, streamlining is also a benefit, however it is often viewed more in terms of reduced costs (due to the integration of support services) rather than the greater convenience of the support team. The cost savings go much further. Converged communications encourage a greater degree of efficiency which translates into time savings and also resource savings.


Payment card industry gets updated security standard with new requirements
The PCI Security Standards Council released version 3.0 of the PCI Data Security Standard (PCI DSS) and corresponding Payment Application Data Security Standard (PA-DSS), adding new security requirements and guidance for payment-card industry organizations, including merchants, payment processors, financial institutions and service providers. The new version will go into effect on Jan. 1, but organizations will have until Dec. 31, 2014, to make the transition from PCI DSS 2.0.


How to solve operational BI problems with SOA middleware
In traditional BI, the focus is often on setting up a big data warehouse to answer any question. Operational BI, however, is about finding an answer to a specific business problem, usually for a nontechnical user. This means you don't give an analyst a tool to try out. You have to think about giving the nontechnical worker an answer, and make sure that answer is relevant and worth giving as a response on a regular basis.


MDM, MAM in the Top Enterprise Mobility Priorities among ITDMs
Of the organizations surveyed, approximately half have implemented technologies to support mobile devices, with 48 per cent using mobile device management (MDM) and 47 per cent using mobile application management (MAM). Organizations are also recognizing the need to provide Windows apps and desktop to mobile workers, with 41 per cent of businesses using or planning to use application virtualization and 40 per cent leveraging desktop virtualization.


Career advice: Where to focus? Data, data, data
While much energy and focus is put on systems development, if the systems don't operate and run effectively, they will ultimately not deliver the value needed. Since IT systems are now very integral to the core operations of many businesses, the importance of having skilled operators has grown. The best way to stay up to date on regulations that affect IT operations is to meet with other people in your company who are involved with these regulations -- representatives from legal, human resources, internal audit and risk management.


The State of Location Analytics: Ventana Research
Ventana Research’s benchmark research on trends in location analytics show growing enterprise needs for location services and a signification challenge in analyzing information in location context. Mark Smith, CEO and chief research officer of Ventana Research, shares insights from the report, “Ventana Research Business Trends in Location Analytics Benchmark Research – September 2013.”

JavaFX beats Swing: Changing RIA development platform
The change agent was Rob Terpilowski, Lynden applications architect, who chose JavaFX for its more advanced graphical user interface tools. In this SearchSOA video interview, Terpilowski described the selection process and the challenges, including a steep learning curve that came up during the Swing-to-Java migration. Terpilowski spoke about the pros and cons of JavaFX in a session at JavaOne 2013 in San Francisco.



Quote for the day:

“If we did all the things we were capable of, we would literally astound ourselves.” -- Thomas A. Edison

November 08, 2013

A macro-pattern for public sector systems architecture
The pattern is able to serve shared business and technical services to a set of cooperating agencies or departments that already run the same category of services locally. This is increasingly important in public sector and a growing body of thinking emphasizes shared services. Examples are the FICAM (Federal Identity Credentialing and Access Management) standard, which uses SAML2 to federate across different department websites and determines how users are identified and authenticated for online services;


Facebook goes open source with query engine for big data
Standard data warehouses would be hard-pressed to offer the responsiveness of Presto given the amount of data Facebook collects, according to engineers at the company. Facebook's data warehouse has over 300 petabytes worth of material from its users, stored on Hadoop clusters. Presto interacts with this data through interactive analysis, as well as through machine-learning algorithms and standard batch processing.


CIOs Bullish on Cloud Benefits, But Worry About SaaS Data Silos
“Attitudes about using the cloud for business benefits are largely positive. Their biggest worry is the need to integrate their data between their different apps. SaaS solutions are just so easy to bring in, companies worry they might be creating silos of data,” Host Analytics’ CIO, Richard Broome, told IDN. The survey quantifies these concerns by noting areas where respondents said SaaS and other cloud solutions can be improved, according to Dimensional's senior research analyst and study author Diane Hagglund.


Looking Critically at the “Big Data” Revolution: Deloitte Consultants Weigh In
Biel said that “It’s interesting to see it happen,” he said. “Some of it is regulatory-driven, with the accountable care push happening. We see a lot of providers getting into accountable care,” he noted. “And we’re certainly seeing a large number of payers buying up providers, so they’ll have a certain amount of a captive audience, if you will, and from a data perspective, that’s driving the need to pull together financial and clinical data, so that you can really examine a cohort of a population and get to analytics that are meaningful.”


The Many Rooms of the Business Analytics Mansion
Business schools tend to divide their curriculum between hard quantitative-oriented courses, such as operations management and finance, and soft behavioral courses, such as change management, ethics and leadership. The former relies on a run-it-by-the-numbers management approach. The latter recognizes that people and human behavior play a substantial role. This separation of the curriculum is like the rooms in a palatial mansion.


Nasty new malware locks your files forever, unless you pay ransom
“It systematically hunts down every one of your personal files – documents, databases, spreadsheets, photos, videos and music collections – and encrypts them with military-grade encryption and only the crooks can open it,” said Chester Wisniewski, a senior security advisor at Sophos. Even though it’s infected, your computer keeps working normally; you just can’t access any of your personal files. It’s scary, especially if you haven’t backed-up your data.


Understanding servers' Power-On Self-Test codes
The first few steps of a POST are critical. The POST finishes initializing the first CPU and processor cache and then performs a basic initialization of the core chipset. This includes the Northbridge chip handling CPU and memory, and the Southbridge chip for interfaces like Serial Advanced Technology Advancement (SATA) for storage and PCI Express(PCIe) for external devices.


Preventing vs. Responding to Computer Fraud
It's no secret that the increase in information technology has facilitated the perpetration of fraud in organizations. Companies who are most vulnerable include those who do not know how to identify IT-related fraud, do not have policies to prevent such fraud and do not have policies to prevent management override opportunities within financial related systems. If fraud does occur, these organizations may not have an appropriate plan in place to respond.


Security expert seeks to make surveillance costly again
"Fundamentally, this is a debate about data sharing, about surveillance as a business model, about the dichotomy of the societal benefits of big data versus the individual risks of personal data," Schneier told attendees of the Usenix LISA (Large Installation System Administration Conference), being held in Washington this week. "We might not buy [it], but the basic NSA argument is 'You must give us your data because it is keeping you safe.'"


Integrators jump on Cloudera's big data bandwagon
"Together with Cloudera, we help organizations optimize their current technology investments, exploit massive data volumes and new data types, achieving true insight and forward vision to improve operational efficiency," said Scott Schlesinger, senior vice president of Business Information Management, North America, for Cap Gemini. Specifically, Cloudera will be part of Cap Gemini's Big Data Service Center, responsible for designing, delivering and supporting Big Data solutions.



Quote for the day:

"To have long term success as a coach or in any position of leadership, you have to be obsessed in some way." -- Pat Riley