October 20, 2014

Is your Ethernet fast enough? Four new speeds are in the works
Work is also beginning on a 50Gbps specification, which could be the next speed offered for linking servers in data centers. Both servers and high-performance flash storage systems will drive a need for something more than 25Gbps in the biggest data centers in a few years, Weckel of Dell’Oro said. At Thursday’s event, attendees debated whether to seek a 50Gbps standard or go all the way to a single-lane system for 100Gbps. A 50Gbps specification is more within reach, said Chris Cole, director of transceiver engineering at Finisar.


How Microsoft's expected fitness band fits into its new wearables game plan
It's the Microsoft side of the wearables equation that interests me the most, however. I'm expecting the coming fitness band to have a Windows core inside the device, given Microsoft execs' insistence that Windows 10 will run "everywhere," meaning from the smallest Internet of Things devices, to datacenter servers. The Operating Systems Group team at Microsoft is building a common set of graphics, gaming and media consumption/creation services that will work on PCs, tablets, phones, Xbox consoles and wearables. .


Q&A with Futurist Martine Rothblatt
The data for evolution is so compelling that to deny it seems to me to be denying reality. Evolution is either a consequence of a material world or it’s the result of some kind of supernatural act. To me, it’s the same thing with consciousness. Either you think that consciousness is something metaphysical, or else it’s the result of physical interactions of matter. It’s because people’s brains have a series of connections, of atomic interactions, and computers could have that. To me, to deny cyber-consciousness is to deny we live in a physical universe.


Internet Of Things Will Turn Networks Inside-Out
The point where these two networks connect -- the "come hither" enablers of IoT and our current, manicured data center plumbing -- is going to be a bit like that creepy scene in Spielberg's A.I. Artificial Intelligence, where Gigolo Joe is explaining to a wide-eyed 10-year-old David what he does for a living. Neither had a clue what the other's world was really like, and fortunately neither David nor data center admins really need Joe's icky details. However, the firewalls between these networks will need something entirely new, something that Software-Defined Networking only begins to offer: intelligence.


Sacrificial Architecture
Knowing your architecture is sacrificial doesn't mean abandoning the internal quality of the software. Usually sacrificing internal quality will bite you more rapidly than the replacement time, unless you're already working on retiring the code base. Good modularity is a vital part of a healthy code base, and modularity is usually a big help when replacing a system. Indeed one of the best things to do with an early version of a system is to explore what the best modular structure should be so that you can build on that knowledge for the replacement. While it can be reasonable to sacrifice an entire system in its early days, as a system grows it's more effective to sacrifice individual modules - which you can only do if you have good module boundaries.


Big Data for Finance – Security and Regulatory Compliance Considerations
Many of the traditional point security solutions that are deployed add complexity and management costs, and leave gaps between systems and applications that are highly vulnerable to attack. The increasingly global nature of the financial services industry makes it necessary to comprehensively address international data security and privacy regulations. Financial institutions are top targets of cybercrime. While all types of businesses are vulnerable to attacks by criminals, it’s the security breaches at financial firms that elicit the most media attention, public scrutiny and legislator consternation. When threats occur, it’s more than financial loss at stake.


Oracle v. Google at the Supreme Court: Industry Watchers Weigh In
"If Google wins, the status quo prevails; if Oracle wins, then Google will either have to strip out Oracle-patented IP or pay Oracle for the right to use its IP," he said. "In the latter case, Google will 'own a piece of Android,' a nice position given that Java ME is a nonstarter among smartphone and tablet OSs." Martijn Verburg, CEO of jClarity, a startup focused on automating optimization for Java and JVM-related technologies, and co-leader of the London Java Users' Group, is also sanguine about the effect of the rulings on the Java community so far.


How Microsoft is taking on the cross-platform challenge with Office
With a common C++ core, a thin native UX layer and evolving PALs, Microsoft is building its Office apps so they work on different OSes with fairly little tweaking required. Zaika cited PowerPoint as an example, noting that only four percent of its tens of millions of lines are unique to the WinRT/Universal version of Office (the touch-first Office release some of us have been calling "Gemini"). If the XAML code is excluded, the amount of shared code is 98.6 percent he said. The PowerPoint for Android code base includes 95 percent shared code, Zaika said.


Jonas Bonér on Reactive Systems Anti-Patterns
A Reactive approach is able to first isolate and contain the error to avoid it from spreading out of control—which can lead to cascading failures, taking down the whole application—and instead capture it at its root allowing fine-grained failure management and self-healing. Second, it allows you to reify the error as a message and send it to the best suitable receiver—the component best suitable for managing the failure (usually called the component’s Supervisor)—not just right back to the user of the service. Now, if the error is just an ordinary message then it can be managed just like any other message; sent asynchronously, to one or many listeners, even across the network for full resilience.


James Comey, F.B.I. Director, Hints at Action as Cellphone Data Is Locked
But F.B.I. agents see the encryption as a beachhead they cannot afford to lose. With the latest software, the new phones will be the first widely used consumer products to encrypt data by default. If that is allowed to stand, investigators fear other technology companies will follow suit. If all desktop computers and laptops were encrypted, it would stymie all kinds of criminal investigations, they say. Mr. Comey’s position has set up a potentially difficult struggle between law enforcement agencies and the nation’s high-technology manufacturers, who have rebuffed the government’s demands for a way to decode data.



Quote for the day:

“The right thing to do and the hard thing to do are usually the same.” -- Steve Maraboli

October 19, 2014

Services and Enterprise Canvas review – 3C: Validation
In practice – as can be seen in part via that list above – it’s often the case that each value and validation-service is supported by a relatively small core-team whose job it is to ‘hold the flag’ for the respective value. Also in practice, each of these core-teams would (or should) typically report direct to the organisation’s senior-executives – because in most cases, it’s that executive board who are formally liable and accountable for compliance to the respective laws, regulations and standards around that respective value.


A Big Data Strategy — A CIO Survival Tool for Today’s Organization
Even if data is useful today, it may not be useful in a month, or six months, or a year. So whenever data is stored within your system, whether on-premises or in the cloud, that data should have an end-of-life date. Yes, in some cases that date will be never, but there’s relatively little data most organizations need to preserve for all time. Any data that doesn’t meet that standard should sunset at a pre-determined time. Ideally, this should happen automatically, without further action from you or your staff.


PaaS is the Operating System
When looking at container-based PaaS offerings, such as CloudFoundry and Heroku, one can see many of these functions in operation across a set of virtual compute resources. If we consider that Infrastructure-as-a-Service (IaaS), bare metal and virtualized hardware inclusive of traditional operating systems, such as Windows and Linux, all represent the modern day equivalent of a compute node in a cloud universe then we can take the leap that the PaaS provides the interface between the user and that node.


Intelligent Transportation Systems Require Intelligent Mobile Networks
Cisco also showed how Connected Transportation solutions can leverage the intelligent – and virtualized – mobile core network. We demonstrated a [fictional] after-market connected car application (“CarConcierge”) that enables users to remotely start or unlock their car, do a car “health check,” and extract car-sourced analytics over an LTE mobile network. The demonstration showed how the Connected Transportation market will see an explosion of innovative new applications that mobile operators can monetize by providing secure, intelligent, and cost-effective connectivity and process automation to devices and vehicles.


How to define the ISMS scope
You can draw your processes that are included in your ISMS scope, and then outside of this circle draw the processes that are provided from outside of your scope. By processes, I don’t mean only security or IT processes – I mean the main business processes within your scope; ... Once you know the dependencies, you have to identify the interfaces. They are important for a company to understand its ISMS boundaries, and to understand which inputs and outputs will be going through these interfaces in order to protect them better.


Why R is Better Than Excel for Fantasy Football (and most other) Data Analysis
Many articles have been written on why R is better than Excel for data analysis. In this post, I will summarize the reasons why R is advantageous in most data analysis circumstances, with a focus on fantasy football analysis. Although this post focuses on the benefits of using R for fantasy football analysis, the benefits of R extend to many other domains (e.g., finance, time series, machine learning, social sciences; for a list of different domains of R packages, see here).


Calling Dr. Algorithm
The race to develop a working tricorder is just one small aspect of a much larger movement to integrate advanced technologies into the process of delivering healthcare. Although many other fields have been massively disrupted by new technology in the past several decades, healthcare has been relatively immune to change. Unfortunately, the U.S. healthcare system (despite claims that “it is the best in the world”) has serious problems: Although U.S. per capita healthcare costs are the highest of any country in the world, the U.S. lags behind many other countries in terms of key health indicators like longevity and infant mortality.


Preparing Your Enterprise for Big Data
Big data involves the acquisition, transformation, and storage of large volumes of data and its subsequent analysis. To do this, most organizations acquire one or more ready-made solutions from vendors. A popular choice is the IBM DB2 Analytics Accelerator (IDAA), a hybrid hardware and software solution from IBM. This hardware (sometimes called an appliance) includes a multiple terabyte disk storage array in a special-purpose hardware chassis, as well as high-speed networking cables to transfer data from enterprise storage. Once the data is stored in the appliance it can be accessed as if it were a database.


Why Enterprise Architecture?
Enterprise Architecture (EA) is no longer a tool or process only exercised by the IT department to capture a static image of the IT infrastructure. EA has climbed the corporate ladder and now resides with upper management as a decision support tool translating business vision and strategy into effective enterprise change. By incorporating and integrating Project Portfolio Management (PPM), Enterprise Risk Management (ERM), and executive leadership’s vision, EA now takes a risk based approach to help organizations achieve mission goals and accomplish business objectives by selecting, controlling and evaluating projects to determine the best mix of projects and the right level of investment to make in each.


The State of Practice in Model-Driven Engineering
The study reflects a wide range of maturity levels with MDE: questionnaire respondents were equally split among those in early exploration phases, those carrying out their fi rst MDE project, and those with many years’ experience with MDE. Interviewees were typically very experienced with MDE. We discovered several surprises about the way that MDE is being used in industry, and we learned a lot about how companies can tip the odds in their favor when adopting it. Many of the lessons point to the fact that social and organizational factors are at least as important in determining success as technical ones. We describe elsewhere the gory details of the research approach.



Quote for the day:

"A leader should demonstrate his thoughts and opinions through his actions, not through his words." -- Jack Weatherford

October 18, 2014

Bionym's wearable authentication device ships to developers
A wearable authentication device, which communicates with devices and apps via Bluetooth, could get around that issue. "Passwords, which we still use today, are yesterday's answer to security," Jeff Kagan, an independent analyst, said in a previous interview. "We need new technology going forward. This sounds like an interesting company trying to solve a growing problem that we're all experiencing." That means the wearable could give users the convenience of being able to move about their day without remembering passwords or carrying keys, a credit card or ID.


The Emergence of the Third Platform
The successful implementation and deployment of enterprise SoR has been embodied in best practices, methods, frameworks, and techniques that have been distilled into enterprise architecture. The same level of rigor and pattern-based best practices will be required to ensure the success of solutions based on Third Platform technologies. Enterprise architecture methods and models need to evolve to include guidance, governance, and design patterns for implementing business solutions that span the different classes of system. The Third Platform builds upon many of the concepts that originated with Service-Oriented Architecture (SOA) and dominated the closing stanza of the period dominated by the Second Platform technologies.


Press Start to Learn: How Gamification Is Changing Education
One essential element of gaming being utilized is that of visual progression. Students and gamers like to see their progress, whether it be with a level-up bar slowly being filled or actual cosmetic changes on the player’s avatar. They like knowing all the work they’re doing is having a more immediate result instead of waiting for a report card many months down the line. Some classrooms are using the idea of acquired points as a reward for students. That visible progress is an outward sign of how well they are doing.


Best Practices in Mobile Business Intelligence
Enterprise-wide integration of mobile business intelligence has many benefits for organizations, including increased workforce productivity, the ability to collaborate anytime and anywhere, and improved customer satisfaction. However, there are a number of hurdles to overcome: convincing your organization to deploy the infrastructure that is necessary for mobile security, understanding mobile versus desktop report development, incorporating the concept of bring-your-own-device (BYOD), and garnering support for utilizing a mobile device to analyze critical decision-making data.


Cloud computing terms defined in new ISO standard
"A public cloud may be owned, managed, and operated by a business, academic, or government organisation, or some combination of them. It exists on the premises of the cloud service provider," it said. "Actual availability for specific cloud service customers may be subject to jurisdictional regulations. Public clouds have very broad boundaries, where cloud service customer access to public cloud services has few, if any, restrictions." The private cloud, in contrast, is "where cloud services are used exclusively by a single cloud service customer and resources are controlled by that cloud service customer".


The Contrarian’s Guide to Changing the World
It’s less clear whether his ideas have much to offer the rest of us. Thiel has been asking a huge question for a few years now: How can we avoid a dismal future of resource depletion, environmental degradation, mass unemployment, and technological stagnation? He thinks the answer is a new wave of startups that grow as large as Microsoft, Google, and Amazon but take on bigger problems, such as curing cancer or providing cheap, clean energy. He claims we aren’t making progress on such things now because we’ve grown less ambitious as a society.


BCBS 239 – What Are Banks Talking About?
BCBS 239 set out 14 key principles requiring banks aggregate their risk data to allow banking regulators to avoid another 2008 crisis, with a deadline of Jan 1, 2016. Earlier this year, the Basel Committee on Banking Supervision released the findings from a self-assessment from the Globally Systemically Important Banks (GISB’s) in their readiness to 11 out of the 14 principles related to BCBS 239.  Given all of the investments made by the banking industry to improve data management and governance practices to improve ongoing risk measurement and management,


Silicon Valley's next disruption: Reality!
Microsoft Research is working on a patented technology that uses projectors to display game play onto the walls, ceiling and floor of a room. The basic application is that you play some future Xbox game. As is the case today, the main game play happens on a TV screen. Let's say you're playing a first-person shooter in a tropical jungle. IllumiRoom would project the rest of the jungle all over the room -- creating peripheral vision to the focused play on screen. This again challenges the notion of virtual reality. The room is real, but the jungle is virtual and computer-generated.


Data-Driven Business Processes Essential for Optimization
The information management issues in process design and execution are similar to those at work for analytics. However, addressing them effectively requires a different approach than just creating a separate data store to be the “single version of the truth.” Careful consideration is required to determine the best method to manage data throughout a core business process, particularly when multiple applications are required to automate and support the execution of the process. Software application platforms offered by some vendors make it far easier to integrate niche software applications into processes in a way that may eliminate the need for an operational data store.


Cloud Automation in a Windows World
There are a couple different perspectives one can take to stack up today’s Windows automation landscape. One is to compare the state of Windows automation as it stands today with its state five years ago. This might lead one to feel impressed with how much the technology has grown and you may look optimistically to the future. The other perspective is to compare today’s Windows automation ecosystem with the tooling that surrounds Linux based infrastructures. At first glance things may not look so different but the closer you look and the more you tinker, you become aware of the fact that there is an undeniable gap in maturity.



Quote for the day:

"Not everything that counts can be counted, and not everything that can be counted counts." -- Albert Einstein

October 17, 2014

Six browser plug-ins that protect your privacy
There's one other consideration, and that's the funding behind the blocker. While most of the apps that I looked at are free or open-source, supported exclusively by donations, at least one, DoNotTrackMe, employs a freemium model (charging a subscription fee if you want advanced features), while Ghostery asks you to provide usage data. Of the six tools reviewed here, only Adblock Plus has an "acceptable ads" feature that allows advertising from Google and other paying companies, and it's turned on by default. But you can easily disable it if you want a totally ad-free experience.


The anatomy and physiology of APT attacks
Nothing in our past has happened so quickly or with as far-reaching implications and dependencies. Critical networks, utilities and other infrastructures are all intertwined with the networks of companies and governments. Almost everything that's built, designed and manufactured is on the Internet. If the Internet stopped working, the global economy would collapse. With that dependency comes issues of national security. Governments have recognized the strategic and tactical advantage of having both defensive and offensive capabilities in the electromagnetic arena.


New technique allows attackers to hide stealthy Android malware in images
In the researchers’ demonstration, the APK hidden inside the image was designed to display a picture of Darth Vader, but a real attacker could use a malicious application instead to steal text messages, photos, contacts, or other data. During the demonstration, Android displayed a permission request when the wrapper application tried to install the decrypted APK file, but this can be bypassed using a method called DexClassLoader so that the user doesn’t see anything, Apvrille said. The image wouldn’t even have to be included in the wrapper application and could be downloaded from a remote server after installation, she said.


Putting the R in the Open Source Revolution
With big data, of course, comes big data analytics. R is the statistical and data science programming language of choice. It is capable of solving complex statistical problems, applying machine learning techniques and creating very rich data visualizations, and it doesn’t care how big the data is. As an open source language, R has seen its share of development and distributions. Its thriving user community has been steadily creating packages to perform specialized techniques and reporting tools. R is perceived by some as being far more flexible and extensible than its legacy counterparts, namely SPSS and SAS. And the college kids are learning it, so it must be cool.


Isolationism, Globalization and the Role of the Colocation Provider
The UK Data Protection Act’s eighth principle states that “personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.” When you read the interpretation of the principle, it suggests that a colocation provider could be subject to “the law in force in the country or territory in question.” Does this mean that despite many colocation providers not knowing what is on a client’s server, they could be unwittingly contravening an international law and in doing so also contravening the UK Data Protection Act?


10 areas of IT risk you could be overlooking
CIOs spend hours reviewing risk management. Prominent areas of concern include disaster recovery, data breaches, and the financial viability of certain technology strategies. But there are a number of less obvious issues that IT typically overlooks -- and the negative consequences of doing so can be significant. Here are some of those under-the-radar risks.


Intel preps new technology to secure credit card transactions
"We need to make sure retailers have the tools they need to collect data from the end point and hold onto it securely," Corrion said. Consumers are also using new forms of payment, including Google Wallet and Apple Pay, which use NFC (Near Field Communication). Intel's technology can protect NFC transactions, and can create a secure layer so payment data is securely transmitted. The Intel system handles every step of a transaction, making it easier for retailers to deploy, Corrion said. Other systems use separate payment peripherals and encryption technologies, which are difficult to manage centrally, he said.


Continuous monitoring demystified
Even though continuous monitoring has been a part of the information security lexicon for several years now, many security professionals are still wondering how to get started: What technologies typically make up continuous monitoring infrastructure? What steps should you take to successfully implement these types of security controls organization-wide? Before implementing a model with specific technologies, you and your team should set high-level goals and plan to achieve the following objectives with your continuous monitoring approach:


Living With 1990 Tech for a Day – Part 1
Since my music collection is in digital form, I have no choice but to rely on the radio. Here I'm in luck. Large swathes of the New Zealand population are conservative in their musical tastes: they like what they know and they know what they like. Within moments, Fleetwood Mac's Seven Wonders drifts over the airwaves, Stevie Nicks' dulcet tones providing the perfect backdrop to my retro computing experience. Then doubt strikes me as I seem to recall that the song was from the late 80s, not 1990. The doubt vanishes when I realise that without the internet I have no easy way to check.


Why SOA Should Be Viewed As “Dependency-Oriented Thinking”
If you had to reduce the principles of SOA to one practical rule of thumb for designers, what would it be? I’m willing to bet it will be “Avoid point-to-point connections”. That’s the rule of thumb I’ve heard dozens of SOA experts provide as advice at more than a few organizations I’ve worked for. On the face of it, that sounds like perfectly reasonable advice, because everyone knows that point-to-point connections cause rigidity and brittleness, and SOA is all about flexibility and agility, right?



Quote for the day:

"One measure of leadership is the caliber of people who choose to follow you." -- Dennis A. Peer

October 16, 2014

McAfee highlights security challenges of a next-generation government
“The fundamental nature of the threat is unlikely to change as governments move towards the next-generation," said the report. "On one hand, new technology could reduce the number of human ‘entry points’ into the system. On the other, the human element that remained would be that most critical to the system’s operations. This could mean the impact of a breach would be more significant than in a situation with multiple users with more limited responsibilities.”


Researcher builds system to protect against malicious insiders
"Insider threats are many times the most devastating, as they are the least expected," said Patrick Moorhead, an analyst with Moor Insights & Strategy. "Companies spend most of their security time and money guarding against external threats.... So that sometimes leaves the inside exposed." To combat this, Yao is combining big data, analytics and security to design algorithms that focus on linking human activities with network actions. Typical computer systems monitor things like network traffic, file system events and email activities. They also focus on looking for specific warning signs, like someone uploading large amounts of data.


Top 10 IT trends that rattle data center I&O
Whether it's software-defined networking, storage or data centers, software-based tools that connect computing resources and components are dispensing with traditional physical devices hard-wired or hand-configured across the data center. Software-defined anything concentrates management in a single place or tool, either on- or off-premises. These technologies also share a common goal of enhancing workload mobility and traffic flow based on logical rules, allowing workloads to be provisioned and run where they are most effective or efficient.


Google's big Android Lollipop challenge: Make Material Design stick
Google has rolled out its Nexus 9 tablet, Nexus 6 phone and Nexus Player streaming device all in a bid to show off the latest version of Android, known as Lollipop, and the glue between the screens will be a something the search giant calls Material Design. Like Apple, Microsoft and Amazon, Google is on a mission to tie its various devices together and adapt content and tasks to multiple screens. Windows 10 will be all about the multiple screens. Apple's iOS 8 melds tablets and smartphones and increasingly blends in with the Mac OS too with matching design metaphors.


Startup builds on Wi-Fi chips for cheaper 'last mile' to home broadband
The Mimosa gear uses that protocol along with beam-forming features to point radio signals at individual homes. That lets it cover a whole neighborhood with transmitters placed one per kilometer or so, Fink said. In a typical setting, such a network could offer service of about 500Mbps (bits per second) both down to subscribers and back up to the Internet, he said. Mimosa has met with service providers in the U.S. and other countries and expects networks built with its technology to launch in the middle of next year. Mimosa's system uses the same unlicensed 5GHz band as Wi-Fi for the main connections between access points and homes.


How to match cloud integration tools to business needs
It really has to do with the intensity, if you will, of the integration task that is being overcome when an organization is deploying a variety of cloud [or] SaaS solutions. And in some cases, a simple API may be all that's necessary. But in many cases, especially when it comes to a couple of these who are using enterprise-class business applications across their organization and in tandem with legacy on-premises applications and data sources, depending upon the use case and business process, there's going to be a need for varying kinds of cloud integration tools and connectors and, even in some cases, platforms to satisfy their needs.


Google adds security and flexibility to latest Android mobile OS
Security enhancements include the flexibility to secure devices with a PIN, password, pattern, or by pairing a smartphone with another trusted device like a watch. This feature – called Smart Lock – is aimed at encouraging users to set passwords by making it unnecessary to type in a password whenever the trusted device is detected. The encryption of all stored data is also now a default setting to help increase security by offering protection for data on lost or stolen Android devices. According to Google, security-enhanced Linux enforcing for all applications means even better protection against vulnerabilities and malware.


Security vendors claim progress against Chinese group that hacked Google
The hackers, referred to as "Hidden Lynx" by Symantec, are believed to have been behind "Operation Aurora," a famous cyberespionage campaign revealed in early 2010 that compromised as many as 20 companies. Google said the attack stole some of its intellectual property and also appeared to target the Gmail accountsof Chinese human rights activists. Google's comments fueled a growing diplomatic row between the U.S. and China over cybersecurity issues. Other U.S. companies followed Google in more directly blaming China for sophisticated long-term infiltration campaigns.


IT Hiring Trends Up, But Budget Trends Disappoint
The persistence of lower budgets seems to have finally impacted IT leaders’ confidence in their ability to satisfy business demands. Over the course of the year there has been a decline in those who expressed confidence (-3 percent) and those who were neutral (-4 percent) and an increase in those who were not confident (+7 percent). In addition to never receiving increased budgets in order to complete workloads, reasons for this decline in confidence could be attributed to the realization that time is running out to complete planned projects or that additional IT projects have been scheduled for the remainder of the year.


Forget the Internet, Brace for Skynet
Several important technology milestones need to be reached along the way. The drones that will make up Skynet have a lot more in common with satellites than the flippy-flappy helicopter drone thingies that the popular press is fixated on right now. They’re really effing BIG, for one thing. And, like satellites, they go up, and stay up, pretty much indefinitely. For that to happen, we need two things: lighter, higher-capacity wireless gear; and reliable, hyper-efficient solar tech. So some work still needs to be done on the physics of Skynet; but not that much work, and certainly not anything beyond the reach of hard-working American (or Chinese, or Chinese-American) engineering types.



Quote for the day:

"A leader is someone people respond to, trust and want to work with." -- @ShawnUpchurch

October 15, 2014

This Headline Is One of Many Experiments on You
“When doing things online, there’s a very large probability you’re going to be involved in multiple experiments every day,” Sinan Aral, a professor at MIT’s Sloan School of Management, said during a break at a conference for practitioners of large-scale user experiments last weekend in Cambridge, Massachusetts. “Look at Google, Amazon, eBay, Airbnb, Facebook—all of these businesses run hundreds of experiments, and they also account for a large proportion of Web traffic.”


Distributing data science brainpower more equitably among the haves and have-nots
Everybody has to make a living. Data scientists, like anybody else, tend to gravitate to where the jobs are, especially those that fetch higher salaries, offer the resources needed to achieve their dreams and promise more rewarding career paths. For that reason, larger employers with well-established, amply funded big-data initiatives tend to have an advantage over smaller organizations when it comes to recruiting the best and brightest data scientists. For that reason, nonprofits, charities and small businesses tend not to have full time staff data scientists, even though they may benefit as much from data mining and predictive modeling as much as their Fortune 1000 counterparts.


How is a Mega Data Center Different from a Massive One?
The concept of “size” in data center discussions and reports is sometime defined by power capacity, utility supply, number of racks, building area or the compute room area. Density today also has a variety of meanings. DCI proposes that in data center context, size should only describe size of the compute space, and density should be measured peak kW load. Size, according to the think tank, is defined using rack yield and area of the compute space. Here are DCI’s size definitions:


Big Data Can Guess Who You Are Based on Your Zip Code
The database is a fascinating glimpse into how marketers see the world, and how data profiles can link populations in distant cities—or not. Though cities like Portland, Oregon, and Austin, Texas, might be compared culturally, their marketing profiles are fairly distinct. And while the majority of consumers in Beverly Hills share a profile with those on Philadelphia's Main Line, for example, they don't match up with the profile for residents of similarly expensive zip codes on Manhattan's Upper East Side.


Flashback: CP/M and the beginning of the microcomputer era
Like all operating systems of the time, CP/M was a proprietary operating system, with the source code closely protected by its creators. Even so, through judicious pre-Internet networking on the university-centric Arpanet, I was able to get my hands on a reverse-engineered dump of the CP/M source code. In fact, the CP/M source code is what inspired me to write this article today. In honor of the 40th anniversary of the first build of CP/M, the Computer History Museum is releasing dumps of a few different versions of CP/M source code, including the reverse-engineered listing I found so valuable to my work.


POODLE flaw POOs on SSL (time to panic?)
security researchers have discovered a vulnerability in SSL 3.0 that allows attackers to decrypt encrypted connections. ... The attack is, we're told, easy to perform, and can be done on-the-fly using JavaScript. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol. ... Websites and...browsers are...expected to end support for SSL v3 as it's now considered insecure by design, and instead enforce the use of TLS. ... Websites that end support for SSL v3 will become incompatible with older browsers and OSes...the final nail in the coffin for machines stuck on IE6 and XP.


CIOs fear poor cloud investment is making businesses uncompetitive
CIOs acknowledged the missed opportunities and threats involved if IT does not move to a more flexible and agile approach to support revenue growth and competitiveness.  Over a third of CIOs admitted that if their IT departments were not able to modernise IT effectively in the next 12 months it would lead to reduced staff productivity (38%), increased time to market (34%), reduced ability to service customers in new ways (33%), a risk of data theft occurring (35%) and limit their company’s ability to launch new products and services (35%).


Big Data and Quantified Self-Awareness
A lack of self-awareness, what I call self-not-so-aware-ness, is a blessing at times since it makes us blissfully blind. Happiness, according to some psychologists, is largely about self-delusion. As David McRaney explained in his book ...  “You believe that your abilities are sound, your memories perfect, your thoughts rational and wholly conscious, the story of your life true and accurate, and your personality stable and stellar. The truth is that your brain lies to you. Inside your skull is a vast and far-reaching personal conspiracy to keep you from uncovering the facts about who you actually are, how capable you tend to be, and how confident you deserve you feel.”


French Bank to Allow Sending Money With Tweets
As part of the service, called S-Money, people will be able to transfer up to 500 euros, about $635, through their Twitter accounts in the latest sign of how technology is seeping into the world of banking. "The service is instantaneous," said Nicolas Chatillon, the head of the BPCE unit that is overseeing the project. He first approached Twitter with the money transfer idea over the summer. "We are pioneers," he said. "We’re trying to make life easier for Twitter users." The American tech giant, which is testing a ‘‘buy’’ button that can be embedded in posts that allow users to buy products through their smartphones or computers, did not directly partner with BPCE on the money transfer service.


More Than LeSS
This is just about the opposite of what senior management typically seeks: they strive for low-risk ways to achieve short-term goals. They are often looking for the legendary low-hanging fruit. This leads to what might be called the “conundrum of change”: small organizational changes can lessen problems, conveniently avoiding the underlying structural problems. And because the prolonged structural problems remain, the next issue will be just around the corner and will require another quick fix.



Quote for the day:

"Three things in human life are important. The first is to be kind. The second is to be kind. The third is to be kind." -- Henry James

October 14, 2014

Compliance Costs Are Rising: Here’s What to Do
If you are still manually reconciling accounts, now may be the time to upgrade. Let account reconciliation tools, whether third-party software or those developed internally, automate and streamline the process. One way for companies to enhance their efforts to meet regulatory demands and curb compliance costs is to use an enterprise content management (ECM) system. Since retaining documents is a key factor in compliance, having a solid document management strategy is crucial.


Dropbox dismisses claims of hack affecting 7M accounts
According to Mityagin, the usernames and passwords posted were likely stolen from other services, but since the reuse of credentials for different online accounts is common among users, attackers tried to use them on different sites, including Dropbox. "We have measures in place to detect suspicious login activity and we automatically reset passwords when it happens," he said. In an update Tuesday to the blog post, Mityagin added that credentials on a new list that was leaked were checked and are not associated with Dropbox accounts.


7 free tools every network needs
Fortunately, many good tools, both commercial and open source, are available to shine much-needed light into your environment. Because good and free always beat good and costly, I've compiled a list of my favorite open source tools that prove their worth day in and day out in networks of any size. From network and server monitoring to trending, graphing, and even switch and router configuration backups, these utilities will see you through.


The Perfect Case Against Microsoft CEO's Remark that Women Shouldn't Ask for Raises
“It’s not really about asking for a raise, but knowing and having faith that the system will give you the right raise. That might be one of the initial 'super powers,' that quite frankly, women (who) don’t ask for a raise have. It’s good karma. It will come back.” His quote was picked up by ReadWrite and quickly (and appropriately) spurred ire around the web.  Not surprisingly, he issued a swift apology, which deferred to Klawe: “Maria’s advice was the right advice. If you think you deserve a raise, you should just ask.”


SDN Will Affect SaaS Agility
"COTSification" will also be the enabler that moves the capability down-market rapidly. The implications for SaaS are multifold. Irrespective of whether the SaaS vendor is set up in the cloud or not, that vendor is handling a multi-tenant operation. It isn't on the scale of Google or AWS, but it is still complex and demanding. Moreover, competitive positioning will require a nimble approach to changes, such as peak-demand scaling, level-loading, and load-balancing, that occur during daily operation, as well as the comings and goings of resources on a longer cycle.


Powerful quantum computers move a step closer to reality
“For quantum computing to become a reality we need to operate the bits with very low error rates,” said Scientia Professor Andrew Dzurak. Error correction can only do so much, and without accurate hardware, getting millions of calculations slightly off soon adds up. “Even though methods to correct errors do exist, their effectiveness is only guaranteed if the errors occur less than 1% of the time,” Dzurak continued. “Our experiments are among the first in solid-state, and the first-ever in silicon, to fulfill this requirement.” The steady progress of quantum computing is a scientific marvel, and some of the problems the technology can be used to tackle, such as puzzling out how proteins fold, will bring positive outcomes.


How giant companies see the cloud
Boston Scientific also has adopted cloud services for collaboration, accounts payable, invoicing and supply chain. The company is moving faster with SaaS than with IaaS workloads. “SaaS allows us to quickly support our business globally,” Adduci says. “The ability to access a lightweight app, with a powerful back end, and spin it up in minutes, is really a tremendous asset when you’re moving in fast-paced markets.” The “maturity level” of IaaS puts that on the “near-term horizon,” Adduci says.


Mobile devices and the enterprise network
Puri doesn't believe you can manage mobile device usage across an enterprise network. "You can have policies but enforcing those policies can be challenging given the age and behavior of our workforce across the board," Puri states. "What I would also say if you can set in some IT level mechanisms to manage this new trend and get comfortable with it and put policies around it I think we'd all be in a much better place." When asked about Wi-Fi calling, a new iOS 8 feature, Puri sees it potentially clogging up the network. She offers, "The reality is you can't control it but you have to manage it and accept it as a business application."


Big Banks Still Say 'No' to Cloud
"Data is a competitive asset, why would I outsource that?" said Lee Fulmer, chief technology officer and global head of cash management at J.P. Morgan. "That's parking the legal ramifications." Third-party providers don't have the same custodianship mandate a bank does, he argued. "The market infrastructure doesn't have the integrity that allows me not to go to jail if my outsourcing provider does something wrong," he said. Paul Ventisei, head of software architecture at HSBC, takes a similar view. The very idea of the cloud is antithetical to banks' role as data custodians for their customers, he said.


Cloud Computing Is Forcing a Reconsideration of Intellectual Property
“Products are taking on a lot more functionality, like cars that have touch screens, streaming video, and Wi-Fi antennas,” said Russell E. Levine, a Chicago-based partner at the law firm Kirkland & Ellis who specializes in patent infringement and licensing. “Carmakers are used to thinking about the I.P. around brakes and exhaust systems. Now they need to think about who owns what technology in all kinds of products.” Mr. Levine works with a lot of smartphone companies. In that business, it’s not just that an app-rich, cloud-connected phone may be at one moment a chessboard, then an Internet browser.



Quote for the day:

"The real leader has no need to lead - he is content to point the way." -- Henry Miller

October 13, 2014

GE: We’re going all-in with the public cloud
I’m not a big fan of using the word “internal” cloud, because internal is really, in my opinion, well-orchestrated virtualization that people are calling cloud for marketing purposes. But as an operating model, yes. We have internal platforms that drive those same cloudlike behaviors. We have what EMC or one of those guys would call a private cloud when they're selling you one. But our vision is: We think that that’s a stopgap. We think it’s a temporary solution. Frankly, we think even the hybrid cloud is really a temporary solution. I think there could be some good debates over how long you mean when you say "temporary."


Kaiser Permanente: The Rise of the 21st Century Health System
Technology helps us form those tight bonds with our members that are essential to promoting good health. Several years ago we set up an online service, My Health Manager, to enable members to connect with their healthcare providers and health information. More than 4.4 million members are registered. Last year, members used My Health Manager to view more than 26 million test results, send more than 11 million emails to care providers, refill more than 10.8 million subscriptions and schedule more than 2.8 million appointments. Members can access the system via our KP App on mobile devices. We call it “care anywhere.”


Connected Cars Vs. Cybercrime: Tough Fight
As the NHTSA notes in its report, cars built after 2009 have more than 60 independent electronic control units (ECUs) in them for controlling everything from heating and entertainment systems to steering, braking, and engine-monitoring functions. Each of these ECUs is accessible either through wired interfaces such as USBs and SD cards or wireless interfaces including Bluetooth, WiFi or near-field communications. Autonomous vehicles like Google's futuristic concept cars are likely to pack a lot more of such components.


Cybercrime fighters to target kingpins, says top EU cyber cop
Specialists in the virtual underground economy are developing products and services for use by other cyber criminals, the Internet Organised Crime Threat Assessment (IOCTA) report said. The report’s authors believe this crime-as-a-service business model drives innovation and sophistication, and provides access to a wide range of services that facilitate almost any type of cyber crime. As a result, the barriers to entry for cyber crime are being lowered to allow those lacking technical expertise - including traditional organised crime groups - to conduct cyber crime.


Buying enterprise mobility management: How important is independence?
Independence is one of the big themes for EMM players like MobileIron and Good Technology. These companies are focused on mobile management and that's all they do. In the EMM space, independence and focus are hard to find. Among big players EMM is either part of a bundle — VMware's AirWatch and Citrix Xen Mobile are likely to have an attempt at desktop virtualization cross selling — or neutrality with suites have to be proven over time. Will Microsoft really want to manage iOS and Android as well as it does Windows? BlackBerry manages iOS and Android devices too. But since both of those vendors have their own platforms the burden of proof is on them to show they're neutral.


IT industry group slams burdens imposed by proposed EU privacy policy
"There remain a number of weaknesses in the text that will result in unnecessary burdens on data controllers and processors, without any improvement in privacy protection," the group said. The amendment approved by the justice ministers also requires that businesses carry out an impact assessment of the risks associated with holding data, a process DigitalEurope criticized as complex. DigitalEurope also said the rules on sub-contracting data processing work were overly restrictive. Rules for employing data protection officers who are responsible for ensuring compliance with the law are "unwieldy and inflexible," the group said.


Network as a service: The core of cloud connectivity
NaaS, for a cloud network builder, is an abstract model of a network service that can be at either Layer 2 (Ethernet, VLAN) or Layer 3 (IP, VPN) in the OSI model. A cloud user defines the kind of NaaS that their cloud connectivity requires, and then uses public or private tools to build that NaaS. NaaS can define how users access cloud components, and also how the components themselves are connected in a private or hybrid cloud. The best-known example of NaaS in the public cloud space is Amazon's Elastic IP address service. This service lets any cloud host in EC2, wherever it is located, be represented by a constant IP address. The Elastic IP NaaS makes the cloud look like a single host. This is an example of an access-oriented NaaS application.


Database revolutions, reloaded
HP has pointed to three major innovation waves in database history. Starting out with mainframes, we know that these formed the bedrock of the first age of databases — and these were populated and popularised (and so of course refined) by government, the financial services industry, telecommunications — and here’s the interesting thing, these were the industries that used huge swathes of data back in the day. Today it’s all — high volume business transactions ... The second age of data was driven by OLTP. Online Transactional Processing (OLTP) Databases proliferated upwards at the same time the first glory days of client/server computing.


Extreme Networks acquisition breathes new life into company
Overnight, the merger resulted in the network solutions provider doubling in size, both in terms of revenue and portfolio. Extreme, which had struggled to retain a 1% share of the Ethernet switching market, suddenly leapfrogged many of its competitors. The consequences of this were significant; as a $300m company operating in the switching space, Extreme simply did not have the scale to effectively market its products. However, as a $600m company, Extreme ranks fourth in the worldwide market, according to Dell’Oro Group, and now has the necessary clout to start bidding for previously unattainable business.


Researcher makes the case for DDOS attacks
Sauter goes on in some detail with the penalties under Federal law for violating this act and, no argument here, they are extreme and excessive. You can easily end up with many years in prison. This is, in fact, a problem generally true of Federal law, the number of crimes under which has grown insanely in the last 30 or so years, with the penalties growing proportionately. For an informed and intelligent rant on the problem I recommend Three Felonies a Day by Harvey Silverglate. Back to hacktivist DDOS attacks.



Quote for the day:

"Learn to pause... or nothing worthwhile will catch up to you. Prepare your mind to receive the best that life has to offer." -- Anonymous

October 12, 2014

Effective IT governance enhances risk management and statutory and internal compliance
The Indian Companies Act has always provided for controls in information systems as a mandatory internal control requirement as a significant corporate governance requirement. The importance of IT governance is now further accentuated by the new Companies Act 2013, which provides for robust and structured risk management and internal controls, with specific requirements as regards internal controls that are relevant to financial reporting and electronic records. Effective IT governance enhances risk management and statutory and internal compliance.


Living Systems and the Information First Company
Put another way, NewCos are “information first” companies. They map the flows of information in a market, and organize themselves so as to exploit or leverage those information flows, even if the flows are “potential information” - information used in a new way, a manner which may be more efficient, productive, or valuable. Put information first, and let that determine how best to organize energy and matter. Industrial era-companies, on the other hand, value their hard assets first (energy, matter), and only view information as a way to organize or protect those assets.


NIST Cybersecurity Framework: Don’t Underestimate It
The framework also highlights why it is important for senior management to establish and supervise a cybersecurity program. The framework places senior management at the top of the decision-making process and holds senior managers responsible for compliance with the framework. Although senior managers without a technical background might be tempted to defer responsibility to their IT departments, complying with the framework requires them to be educated about the choices their company faces and to take responsibility for allocating appropriate resources to address risks.


Conquer the Top 20 critical security controls
The CSC emphasis on integration and automation makes it align very well with the Security Connected approach from McAfee (part of Intel Security). The Security Connected framework enables you to establish a robust risk management process with integrated solutions and management that protect your infrastructure—including IT and incident command systems (ICS) without impairing system availability. Because our and partner solutions share a unified, policybased management platform and real-time threat intelligence, organizations can move easily to adopt incremental controls as part of a consistent, efficient process.


New iRobot App Lets You Control a ‘Bot Army With an Android Tablet
The new control hub is called the uPoint Multi-Robot Control system, and it’s an Android app. It supports hopping between individual robots, so if you have several in your setup and simply tab over to control a different machine. With it, controlling the robots is even easier than driving a remote-control car. In the simplest setup, the app’s live-view screen shows you a feed from a robot’s front-mounted camera, and tapping on locations simply drives to that point. You can also drag your finger from the robot to different parts of the scene to lead it there. Doing so shows the drive path the machine will take, curves included. It makes it incredibly easy to navigate the robots around obstacles and corners.


FDA Follows NIST Framework in Cybersecurity Guidance for Medical Devices
While not yet mandatory, the FDA strongly recommends that manufacturers follow the guidance in explicitly addressing cybersecurity risks in premarket submissions for medical devices, particularly those that rely heavily on software, access patient data, and connect with electronic networks. So what, exactly, are the highlights of the FDA’s guidance for medical device manufacturers? And what are the take-away lessons for companies in the industry, whether or not they’re in the process of seeking premarket approval for new devices? Following the NIST Framework, the FDA recommends that companies focus on five core functions in addressing and managing cybersecurity risks: Identify, Protect, Detect, Respond, and Recover:


The Protection Revolution - A Needed Counter to Attacks
As security professionals, we need to follow a similar trajectory to hackers and apply lessons learned from the Industrial Revolution to become faster, more efficient, and more effective in our sector: a “Protection Revolution,” if you will. Just as technologies and capabilities for attackers have improved, so have technologies and capabilities for defenders. This gives us a unique opportunity to move toward security systems built on a foundation of broad-based visibility, depth of data collection, the ability to learn through correlation and context, and then dynamically apply controls.


Strategies for Security Governance
When dealing with contested security issues, or when escalating security risk issues to senior management, assume that your audience does not understand information security. Your narrative messages should be short—preferably one page and no longer than two pages. Talk in business risk terms and terminology. Be factual: issues must be dealt with in a straightforward manner. Do not sugar coat or exaggerate issues. Fear, uncertainty or doubt should not be used. Jargon should be explained or not used at all. Senior management should be updated at least three times a year on the general risk posture of the organization and outstanding high risk security issues that are being monitored.


Leading Enterprise Organizations Have Established a Dedicated Network Security Group
This “us-and-them” mentality appears to be legacy behavior. According to ESG research, 47% of enterprise organizations now claim that they have a dedicated group in charge of all aspects of network security (note: I am an ESG employee). Additionally, network security is done cooperatively by networking and security teams at 26% of organizations today, but these firms insist that they are in the process of creating a dedicated network security group to supplant their current division of labor.


How CIOs can plug critical gaps in IT governance
Cyber security is a fast-changing and complex field whose professionals will benefit from access to a foundational body of knowledge, education, and thought leadership from chief information security officers (CISOs) and other security experts working in the industry. By using industry frameworks such as COBIT to gain access to key tools, specific guidance they require, and access to the latest tips and insights from the industry, these professionals can ensure they are keeping up to date with ever-changing industry challenges and increasingly sophisticated attacks.



Quote for the day:

"You cannot be a leader, and ask other people to follow you, unless you know how to follow, too." -- Sam Rayburn

October 11, 2014

User Interface Testing for Mobile Applications
It is the duty of a QA to ensure that the application has a easy to use user interface. The QA should have a proper knowledge about the flow of the devices in which the application is to be tested, as the application might have impact on the mobile device’s native application like phone,email,camera,contacts,calender etc. Below are some of the important points that is to be considered in a user interface testing alongwith the some of the basic steps that a QA generally follows to test the various aspects.


“We are in the third era of computing – the cloud and mobile era – but security considerations on cloud are still not widely understood. It is important to address the public cloud security concerns to facilitate its adoption,” Russinovich told delegates at the annual IP Expo 2014 in London.  “This is important because there is no cloud without trust.” Drawing from Cloud Security Alliance’s top nine cloud computing threats, Russinovich listed ten security concerns – listed below – that are typical to public cloud services and explained the measures taken by public cloud service providers, such as Microsoft Azure and AWS, to address those security risks.


Microsoft’sQuantum Mechanics
Progress toward that computational nirvana has been slow because no one has been able to make a reliable enough version of the basic building block of a quantum computer: a quantum bit, or qubit, which uses quantum effects to encode data. Academic and government researchers and corporate labs at IBM and Hewlett-Packard have all built them. Small numbers have been wired together, and the resulting devices are improving. But no one can control the physics well enough for these qubits to serve as the basis of a practical general-purpose computer.


Hybrid Cloud: Hype or Reality
The transition might be gradual, but this approach does not prevent an exciting vision for the organization. Hybrid provides endless option and helps drive innovation, while removing barriers that slow IT down. The promise of cloud is real, but the promise of a one-size-fits-all cloud strategy, however, is not. ... Among all three basic types of cloud – public, private and hybrid – the hybrid cloud is the most flexible and it can be customized to address business service level agreement, compliance and regulatory requirements, while tapping the public cloud for business agility, expansion of new services and shifting expenditure from CAPEX to OPEX. It is no wonder that hybrid cloud continues to draw the interest of executives across all industries.


Zephyr’s CEO Discusses A Simpler Solution To Test Automation Integration
Given the vast array of automation tools and test management solutions in the market that are not geared up for this kind and level of change, you just might have to. It might mean going back to the drawing board to find a new and more appropriate automation tool; and then trying to integrate it back to the test management solution, which might need upgrading or changing itself. Maybe you can’t even integrate this new tool. You are suddenly surrounded by silos of tools and tests and execution results that you are desperately piecing together inefficiently ... In a word, you are in “scramble-state”.


InstantClick dramatically speeds up your website
Latency is inevitable with today’s internet architecture so InstantClick cheats by preloading links you are likely to click on. Before visitors click on a link, they hover over that link. Between these two events, 200 ms to 300 ms usually pass by. InstantClick makes use of that time to preload the page, so that the page is already there when you click. On mobile devices, preloading starts on “touchstart”, letting 300 ms (Android) to 450 ms (iOS) for preloading the page. If you want your website to not be flooded by requests, you can set a delay before preloading starts when users hover a link.


Descriptive, Predictive, and Prescriptive Analytics Explained
The promise of doing it right and becoming a data driven organization is great. Huge ROI’s can be enjoyed as evidenced by companies that have optimized their supply chain, lowered operating costs, increased revenues, or improved their customer service and product mix. Looking at all the analytic options can be a daunting task. However, luckily these analytic options can be categorized at a high level into three distinct types. No one type of analytic is better than another, and in fact, they co-exist with, and complement each other.


Is It Time to Move Your Databases to the Cloud?
For organizations ready to embrace the cloud, options range from self-service DBaaS products to managed database services that offer more in the way of hands-on support. Lines blur between services, though. ... The act of purchasing cloud services is sometimes associated with customers that possess limited technical infrastructure. Akamai demonstrates that's not always the case. "Clearly, there's no lack of server resources," Scobie notes. That said, Akamai's network lacked a persistent data service that would fit the kinds of distributed configurations that company had in mind for its API management application.


Towards a Resolution-Independent Web with SVG
The main advantage of SVG - rightfully advertised all over the web - is its scalable nature. When preparing an icon, a designer can stop worrying about “how it will look” in different dimensions or on mobile devices with different pixel densities, and focus solely on making the asset look great. With SVGs there is no need to export two different raster assets for retina and non-retina displays. As a matter of fact, there’s no need to worry at all about the pixel density of any device, especially given the (sometimes absurd) non-standardised nature of it, but focus rather on the artwork itself. Once an icon is ready, the designer exports a single SVG file - directly from Illustrator - which can be resized at whim by the developer with no loss of quality.


HTML5: A multi-threading approach with Web Workers
The word Web Worker specifies a JavaScript running in the background, without affecting the performance of the page, independently of other user-interface scripts that may also have been executed from the same HTML page. Let’s go into little depth to understand what it exactly means :). Javasc ... Javascript will hang the browser, where the code written by us requires a high CPU utilization. When executing scripts in a Web page, the page becomes unresponsive until the script is finished and shows “unresponsive script” alert message.



Quote for the day

"It is not only what we do, but also what we do not do, for which we are accountable" -- Jean Baptiste Moliere