March 20, 2015

Tech Startups Weigh The Merits Of Austin Vs. Silicon Valley
It’s a far different story in Texas, where land is still cheap. The average price of a home in Austin is just $310,187. And with few land-use and zoning restrictions, homebuilders keep adding to the supply of homes, which keeps prices in check. “Our head scientist moved his whole family here from Cambridge, England,” says Murphy. “He could move here and get a house with a pool. I don’t think we could have gotten him to move to San Francisco.” Murphy was also worried about hiring and retaining top-notch employees in the Bay Area. With plenty of job openings for talented engineers and developers, the fight for good workers has created a kind of “revolving door”mentality among employees.


Transforming an Analog Company into a Digital Company: The Case of BBVA
The issue is not limited to handling an increasing volume of transactions and customer interactions. It crucially hinges on the huge amount of data collected in the course of customer contact, combined with the immense and rapidly increasing volume of information available on the internet, largely supplied by people’s social media activity and devices within the “Internet of Things.” We must capture, store and accurately process all that information to generate the knowledge to offer customers the best possible experience, even anticipating their needs and supporting them throughout their decision-making process. This is what I call “knowledge-driven banking,”


curl, 17 years old today
We’ve hosted parts of our project on servers run by the various companies I’ve worked for and we’ve been on and off various free services. Things come and go. Virtually nothing stays the same so we better just move with the rest of the world. These days we’re on github a lot. Who knows how long that will last… We have grown to support a ridiculous amount of protocols and curl can be built to run on virtually every modern operating system and CPU architecture. The list of helpful souls who have contributed to make curl into what it is now have grown at a steady pace all through the years and it now holds more than 1200 names.


The Increasing Cybersecurity Attack Surface
CISOs need to think about new security requirements based upon an old cybersecurity concept, the “attack surface.” In other words, the entire expanding internal and external IT infrastructure should be viewed as a holistic attack surface and addressed accordingly. So risks should be assessed across the complete attack surface while risk mitigation should include central policy management and security controls for distributed policy enforcement that cover the whole attack surface enchilada. This is critical because multi-dimensional threats will pivot from partner IT infrastructure to endpoint devices, to networks, to cloud-based sensitive data so policies and controls must cover the attack surface and the kill chain.


Making Your Own Servers Wasn’t Always Sexy
To be sure, Rackspace-designed Open Compute servers are not the only kind of hardware running in the company’s data centers. They support its public cloud and bare-metal services. Many of its other more traditional services (things like VMware virtual machines) run on traditional enterprise infrastructure. One reason is the legacy of cross-certification among incumbent vendors. If you want EMC, Oracle, and Cisco to cooperate with each other in supporting an enterprise IT environment running in your data center, that environment better consist of components the vendors have certified to work together.


Enterprise Architecture and Systems Thinking – by Ian Glossop
The pattern of interactions within the system, or between the system and its environment, may endure over time – which leads to ideas of structure in and between systems.  Or the interactions between components and systems may involve the fairly rapid movement of material, energy or information – which leads to ideas about system dynamics.  Hence the very simple, general notion of a “system”, with a proper definition, bootstraps or kickstarts a whole theoretical framework for looking at the world – or bits of the world labelled as “enterprises”. One key observation from this way or looking at the world: the real-world is full of thousands or millions of different systems and individual parts may be components in many systems concurrently.


Keep your Head in the Cloud!
No matter how non-IT-oriented you are, the word “cloud” has definitely reached your life, especially if you’ve got a share in business. Cloud services became an important tool for reaching such business goals ... Today, cloud vendors provide a wide range of services which are supposed to significantly save costs and provide unparalleled business value. However, how true is that? How to choose a right cloud vendor that really meets your business needs and won’t leave decision makers disillusioned?  Having clearly defined your company’s business goals, here are the most crucial factors for you to consider while choosing a cloud provider.


The evolving shape of distributed databases in the Internet of Things
At heart, a database remains an organized collection of data that represents a state of affairs in the subject domain as implemented through a consistent schematic model. Another way of expressing this is the notion that a database is a “global, shared, mutable state,” as discussed in this thought-provoking recent post by Martin Kleppmann. ... Most of these fundamentals haven’t changed in the intervening decades, though NoSQL databases with their emphasis on “eventually consistency” have pushed the transactionality bar into looser, less ACID-ic territory. With that in mind, I took great interest in Kleppmann’s discussion of “turning the database inside-out,” specifically with regard to his vision of the evolving database as an “always-growing collection of immutable facts.”


Is it time for CIOs to step up and rule the digital world?
Companies can't wait any longer, so perhaps it's time for a new kind of quarterback. Nearly three out of four brands either have a chief customer experience officer or plan to hire one this year, says IDC. By 2020, IDC predicts 60 percent of CIOs at global organizations will be supplanted by chief digital officers. In the Harvard Business Review, Scott Brinker says chief marketing technologists will become the connective tissue between marketing and IT. "If you don't have a [chief data officer], you've turned the kids loose on the playground of data, and they're going to do whatever they want," Dorman Bazzell, practice leader at Capgemini, told Computerworld. "There is going to have to be a role that manages all of the use of that data."


What startups can teach CIOs about IT funding
One approach CIOs can take is to ask their CEOs and CFOs the following question: "Is there anything that we're going to be doing at scale that doesn'tinvolve information technology?" The answer these days is almost certainly 'No,' she said, but it is still the CIO's responsibility to make the case why any project of scale will be better if it involves information technology. Pull out the IT project portfolio and make the CEO and CFO see how IT projects and initiatives are supporting their business strategy. However, simply spewing out IT project after IT project isn't enough, especially when it comes to convincing the CFO that IT is worth investing more money in. The case must be made about how these projects will pay off.



Quote for the day:

"Leadership has a harder job to do than just choose sides. It must bring sides together." -- Jesse Jackson

March 19, 2015

How CIOs Become Hybrid Cloud Heroes
It is nearly impossible for the CIO to know exactly what the company will need six, 12 or 18 months from now, but budgets need to be set anyway. Beyond mission-critical operations that are easier to predict, things can change quickly and without much notice. This forces the CIO to keep a safety buffer within his budget to take care of those surprises. In growth years, it is wise to use an even higher buffer, as the company is likely to experience a lot of unpredictability. However, at times when budgets shrink and only must-have projects get funded, projects that cannot be easily explained get left out of the budget, which can stall innovation and growth.


Cyberlegs project wants to equip amputees with robotic limbs
Cyberlegs is a joint project by a number of European institutions: the University of Ljubljana in Slovenia, Scuola Superiore Sant'Anna di Pisa, Fondazione Don Carlo Gnocchi Onlus in Florence, as well the Catholic University of Louvain and the Free University of Brussels in Belgium. Researchers from these schools have been working on the project since 2012 using $2.7 million in funds from the European Commission, but the Italian scientists have only just presented their work to the public this Monday. Thus far, the system has already been tested by 11 people. But when the team got together recently to assess their work, they've determined that they still need to reduce the prosthetic's weight and size for comfort.


Multi-cloud doesn't have to mean cloud chaos
The first step could be to adopt an infrastructure-as-a-service (IaaS) cloud model. By leaving your provider with the more routine tasks, such as hardware, data and server management, businesses can become empowered to focus on innovating and add value to the organisation. What’s more, the benefits of IaaS – including improved security and efficiency, reduced costs, and optimised insights – closely align with IT departments’ modern IT objectives. Although most businesses have a clear understanding of IaaS’ advantages, research revealed that over half are yet to implement it due to concerns around relinquishing control of IT environments.


Measuring the Effectiveness of Your Vulnerability Management Program
Over the years there has been lots of discussion and points of view surrounding security metrics and how to measure the effectiveness of a vulnerability management program. In fact, the Center for Security has even laid out a framework for security metrics developed by an expert panel in an effort to help organizations determine and validate security strategies. In 2004 Qualys first began anonymously using the accumulated vulnerability scan data received from its customers to identify key, quantifiable attributes or metrics to help companies drive strategies for protecting networks, systems and data. These metrics have become known as the “Laws of Vulnerabilities” and are comprised of the following four key measures:


10 portable keyboards for iPhone, iPad, and Android
Unlike some of us, you probably don't set out with your iPhone or Android phone as your only computer. You've got a laptop and perhaps a tablet for getting work done. Even so, sometimes the phone is all you've got with you when the need to write a detailed email or work on a document. That can be a challenge tapping on the little keyboard on the screen. There are quite a few portable keyboards available that can step in when you need to do a lot of writing. Free time with the iPhone or Android phone can turn into unexpected productive time with the right accessory.


CIOs Share Lessons Learned From the Journey to the Cloud
"Ten percent to 20 percent of my staff are not embracing the cloud concept because they feel it's going to put them out of a job," he says. "I wish they would embrace the cloud more. You've got to align your staff with your strategic goals. All our new hires are being hired with that in mind. I don't need anyone to manage physical assets anymore." Patti notes that AccuWeather now tries to do as many educational internal sessions as it can to show his IT staff what the company has done cloud-wise. In fact, Patti now considers cloud the default option for any project. His people need a solid justification for doing something on-premise. "I challenge them to pick something they're doing now and figure out how to do it with the cloud," he says.


Wearables And Other Gadgets Aim To Finally Kill Off The Password
The fingerprint-sensing technology inside the iPhone and the latest Samsung handsets is a marked improvement over a PIN code or a password. They are, however, not perfect: With enough time and effort, fingerprints can be spoofed or fooled. (We leave them everywhere we go, after all.) They're also impossible to change once an account has been compromised.  In its current state, such technology works best as a second layer of protection alongside other security measures. To spoof a fingerprint on an iPhone 6 "requires skill, patience, and a really good copy of someone's fingerprint," but it can be done, writes Marc Rogers from the Lookout security firm.


Methods for De-identification of Protected Health Information
The Privacy Rule was designed to protect individually identifiable health information through permitting only certain uses and disclosures of PHI provided by the Rule, or as authorized by the individual subject of the information. However, in recognition of the potential utility of health information even when it is not individually identifiable, §164.502(d) of the Privacy Rule permits a covered entity or its business associate to create information that is not individually identifiable by following the de-identification standard and implementation specifications in §164.514(a)-(b). These provisions allow the entity to use and disclose information that neither identifies nor provides a reasonable basis to identify an individual


Health records are the new credit cards
“Cyber criminals are now going after health care records because they hold up to ten times more value on the black market over simple credit card numbers," said Carl Wright, general manager at San Mateo, Calif.-based TrapX. Electronic health record information can be used for billing scams that go as high as the value of the health insurance policy, to purchase prescription drugs for resale on the black market, and also for run-of-the-mill identity theft. In addition, recent changes in the health industry mean that many formerly offline, disparate health data sources are now being brought together, said Ivan Shefrin, vice president of security solutions at Cupertino, Calif.-based TaaSera, Inc. "And attackers are carefully studying and exploiting weak spots in new, vast connectivity," he added.


Interview: Building the 'world's greenest datacentre' in Falun, Sweden
Behind the venture is energy utility Falu Energi & Vatten in collaboration with datacentre entrepreneurs EcoDC. “Other players are also starting to look at re-using the energy in district heating systems, but we are the first to utilise it all the way in EcoDataCenter. Apple says they will do it in Denmark in the future, while customers are moving in to our datacentre at the beginning of 2016,” says Jan Fahlén, business developer for datacentres at Falu Energi & Vatten. “This might seem like an obvious thing to do, but the reason others aren’t doing it is that it requires a very strong collaboration with the local energy company,” says Fahlén.



Quote for the day:

"A brand is no longer what we tell the consumer it is - it is what consumers tell each other it is." -- Scott Cook

March 17, 2015

Facebook Makes Open Source Networking a Reality
The Six Pack is not currently running in Facebook data centers at scale. The new switches are being tested in production in several parts of the infrastructure, Ahmad said. The Facebook network switch that is already running at scale is the top-of-rack switch called Wedge, which the company announced in June of last year. At this month’s summit in San Jose, Facebook said it would contribute the Wedge spec to OCP as well. Not only will the spec be available, but there’s also already a vendor that will sell Wedge switches. They will be available from the Taiwanese network equipment maker Accton Technology and its channel partners.


Analysis Paralysis: How “Big Data” May Finally Spell the End of Make-Believe Numbers
Financial modelling certainly has added value to many businesses and does appear to provide a degree of vigor to the process of making business decisions. However, I would argue that there is something amiss in our unquestioning faith in financial models. There is something foul in our Fourier transforms; something putrid in our pivot tables; something decrepit in our depreciation schedules. For all of our reliance upon financial modeling in business, the vast majority of the “facts” that we use in feeding these beasts are absolute rubbish. Our estimates are complete fabrications, our assumptions are myths, our calculations are artifacts of our innate need to categorise and comprehend things that may be neither categorical nor comprehensible.


US firms caught in Chinese censorship crossfire
While cloud services provided by US companies can cloak banned website access -- such as Facebook, Twitter, Gmail and news publications -- it holds risk for the firms themselves. These companies are being forced to walk a fine line as the censorship row escalates, and the unauthorized use of tunnels, VPNs and signing up for free accounts in order to link to blocked websites could land them in hot water as activists are breaking local laws. Generally, the circumvention takes place without the consent of cloud providers. However, to stop this practice, Chinese authorities would need to block full servers -- which would disrupt countless businesses, including thousands of Chinese SMBs, activists say.


Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk
The history of cyber incidents has made this observation very clear: at some point adversaries will get in. And after you mitigate the last attack at some point they will get in again. CEOs asking this question should take this as an opportunity to evaluate and develop the incident response plan that their organization has developed. A comprehensive incident response plan should outline the steps to take if a data breach is suspected or occurs. Having a detailed and tested plan in place prior to a breach occurring will save time and money, and minimize reputational damage when the inevitable happens.


IT Service Management is not Dead – ITSM in an Outsourced World
The commoditization of IT services in the form of multiple ‘as-a-service’ offerings began over a decade ago and will continue to expand with a new ‘aaS’ acronym seeming to appear almost daily at times. As this trend began ITSM specialists globally wondered what this was going to mean for their profession. Would service management move to being something only practiced by cloud vendors? Would the in-house IT department and service desk become a dinosaur and just a distant memory. These fears have not been realized and ITSM is just as relevant as ever, if not more so, but the way we practice it has changed and will continue to do so as the way our IT services are delivered to the business continues to develop and move to a more commodity-based model.


Beyond Join-Move-Leave with IGA Identity Life Cycles
Identity life cycle is so foundational to identity governance and administration that one would expect, after all these years, that IGA solutions would provide good support for real-world business scenarios. Shockingly, that is not what we found during our critical capabilities research. Many IGA vendors still seem to assume that most organizations have a single authoritative source for identity data and that only a single identity life cycle is required. If that is the case for your organization, then you are lucky. In reality, most organizations have multiple identity life cycles and gaps (and even overlaps) in authoritative sources. Some identity life cycle requirements, such as contractor management, are so pervasive that it seems almost capricious that IGA products provide so little direct support.


Security Breaches, Data Loss, Outages: The Bad Side of Cloud
For now, cloud computing has really done a good job staying out of the spotlight when it comes to major security issues. Yes, Dropbox might accidentally delete a few of your files, or some source code becomes exposed. But the reality is that a public cloud environment hasn’t really ever experience amassive data breach. Ask yourself this question, what would happen if AWS lost 80 million records like in the very recent Anthem breach? The conversation around public cloud security would certainly shift quickly. But the reality is that they haven’t. Maybe this gives us more hope that the cloud architecture is being designed in such a way that data is properly segregated, networks are well designed, and the proper boarder security technologies are in place.


Not all data breaches are created equal – do you know the difference?
Personally Identifiable Information, also known as PII, is a more serious form of data breach, as those affected are impacted far beyond the scope of a replaceable credit card. PII is information that identifies an individual, such as name, address, date of birth, driver’s license number, or Social Security number, and is exactly what cyber criminals need to commit identity theft. Lines of credit can be opened, tax refunds redirected, Social Security claims filed – essentially, the possibilities of criminal activities are endless, much like the headache of the one whose information has been breached. Unlike credit cards, which can be deactivated and the customer reimbursed, one’s identity cannot be changed or begun anew.


Cyberdefense in the Era of Advanced Persistent Threats
Security best practices dictate that end users not run as administrators or even be given administrative rights on their own machines.4 Malware often gets on end-user machines by exploiting the end user through well-thought-out socialengineering tactics. Common ploys include asking the end user to click on a link, open a document, or directly install a program. Nothing can totally prevent end users from falling for these tactics. This ultimately means that, for computers and networks to stay malware free, every new piece of code that needs to run on a machine must be trusted or examined by someone who can determine its legitimacy. This idea tends to frighten most people in the industry, but it’s the most effective way to keep malware out of networks.


Why Bankers Are Leaving Finance for No-Salary Tech Jobs
Technological advances are poised to have the greatest impact on banking, 86 percent of the bank chief executive officers surveyed by PricewaterhouseCoopers LLP last year said. More than 30 percent of revenues at European banks will be driven by digital transformation in the future, according to McKinsey. That may involve replacing some people with computers. “If a process is measurable or mechanical, it can be automated,” said Anthony Lim, a Singapore-based cybersecurity consultant who has advised the industry group, the International Information System Security Certification Consortium Inc., or (ISC)2, and the Singapore government. “Any area in investment banking that can be automated will be.”



Quote for the day:

"Lead and inspire people. Don't try to manage and manipulate people. Inventories can be managed but people must be lead." — -- Ross Perot

March 16, 2015

How a tiny screen has developers rethinking their iPhone apps
Developing for wearables also has gotten Evernote's team talking about whether it should rethink how it lays out all notes in the future, Hull said. If the company becomes good at making predictions, it may reorder note lists based on what it thinks you need, offering a special section in the Evernote app for you to grab the notes instead of performing a search. "Trying to predict what users need before they need it ... is where we see the future of the app going in general across all of our platforms," she said. "This functionality is one of the first places we're trying it, but I absolutely anticipate it will inform what we do in all of our apps in the long term."


My Answers for Microservices Awkward Questions
I think it's reasonable to start with a little context building. When I started working on the application I'm primarily responsible for microservices were very much fringe. Fred George was already giving (great) presentations on the topic, but the idea had gained neither momentum nor hype. I never set out to write "microsevices"; I set out to write a few small projects (codebases) that collaborated to provide a (single) solid user experience.  I pushed to move the team to small codebases after becoming frustrated with a monolith I was a part of building and a monolith I ended up inheriting.


What is 'USB Type C' and 'USB 3.1 Gen 1'?
Now, what's interesting about USB Type C is that unlike the MagSafe or Lightning ports you find on other Apple products, it's not proprietary. It is, in fact, part of the USB-IF spec that's been in the works since the end of 2013 and forms part of the USB 3.1 specification. The new MacBook isn't even the first device to feature a USB Type C port, but it was the first to use it so comprehensively, at least until Google unveiled the new Chromebook Pixel a few days later. The port isn't physically backward-compatible with existing USB ports, but the USB 3.1 standard it is built on is, so all that's needed is an adapter to make the conversion. USB Type C is the port, and if you look closely at the specifications, you'll find that Apple claim that the port can do a lot:


Open Compute: More Financial Services Firms Jump In
B of A adds another big name to those of Fidelity Investments and Goldman Sachs, which were among Open Compute's organizing members. At the summit, Capital One and JPMorgan Chase took part in the proceedings and said they too were adopting Open Compute specified hardware. Both had technology leaders on a panel that discussed financial services adoption of OCP. It included: Brian Armstrong, director of next generation infrastructure at Capital One; Matthew Liste, managing director, global technology at JPMorgan Chase; Grant Richard, managing director for technology at Goldman Sachs; and Bob Thurston, head of global data center engineering at Fidelity. "You already see incredible hardware running fantastic software. ... We view this as an inevitable thing to happen," said Richard.


Open technologies and collaboration = doing cloud right
How often do we experience a true alignment of people’s actions with their words? I bet most of us would say probably not often enough. The IT media is all abuzz with marketing noise about how cloud technology will transform IT, but they don’t always have concrete examples to point to. Check out this interesting project run by some pretty smart people who understand that by marrying open cloud technology with collaboration across multiple organizations they can truly transform IT service delivery.


From connected cows to everlasting elevators: How businesses are using machine learning
Eleven farmers fitted cows with internet-connected pedometers to report the number of steps they took each day to an Azure machine learning system. The system was trained to watch how the cows were moving and spot the spike in steps when the cow went into heat. Farmers would then be alerted by text, allowing them to artificially inseminate the animals at the optimal time. The system proved 95 percent accurate in detecting the onset of ovulation and the number of calves born across the farms rose by an average of 12 percent. Farmers also reported having more time as they no longer had to watch for the signs themselves.


Verizon PCI DSS report a wake-up call, says PCI Security Standards Council
“Often an organisation’s approach to PCI security is to focus on passing the annual compliance assessment. But this is just the start of a vigilant, proactive security program. Only a combination of people, process and technology, and a focus on making security a ‘business-as-usual’ practice, will help thwart these constant threats,” said Orfei. Of all the data breaches studied, Verizon’s findings show that not a single company was fully PCI DSS compliant at the time of the breach. “Another troubling trend from this year’s report is that data security is still inadequate," said Simonetti.


Top 10 Reasons Not to Innovate
The CEO’s rationale was that his predecessor had spent freely chasing bright shiny technology objects to the detriment of the business’ core technology infrastructure. And instead of social media or these other bright shiny technology objects delivering new competitive advantage, they actually left the business with a core infrastructure that daily was becoming less capable than the competition at delivering the core elements of value that customers expect from an online travel site. So, he felt that innovation would be a distraction to the business. Instead he wanted every single resource of the organization marshaled to modernize and stabilize the core technology of their online business to deliver great core value for customers, or there would be gradually fewer customers to deliver value to.


What Is Big Data Discovery?
According to Gartner, “Big Data Discovery” is the next big trend in analytics. It’s the logical combination of three of the hottest trends of the last few years in analytics: Big Data, Data Discovery, and Data Science. Each of these areas has seen explosive growth, but there are clear upsides and downsides to each. For example, Data Discovery excels in ease of use, but allows only limited depth of exploration, while Data Science provides powerful analysis but is slow, complex, and difficult to implement.


Q&A on Conscious Agility
If you’ve achieved a state of antifragility, agility is inherent. Agility itself is excellent, as long as responsiveness is sufficient in your context. However, it ceases to be enough when who you are today is on the fast track toward extinction. An organization has to acknowledge when it is time to undergo a rebirthing and that kind of willingness requires a great deal of courage. Unfortunately, I don’t believe there is necessarily a secret recipe or technique, but perhaps a bit of intuition and a high degree of awareness and foresight is required.



Quote for the day:

"Great leaders understand that mistakes are opportunities. Wrathful leaders see any mistake as the failure of the people involved." -- @ManagersDiary

March 15, 2015

e-Discovery Missteps From the Judge’s Point of View
The risks of ignoring e-Discovery issues in the early stages of litigation can lead to irreversible damage, such as destroying data that should have been preserved, said Joy Conti, chief judge of the Western District of Pennsylvania, who participated in the survey. Loss of data can occur if a company experiences a routine changeover in its computer systems, for example, and the hard drive holding the data is destroyed. Additionally, e-Discovery mistakes commonly occur during the preservation and collection stage, the judges warned. In particular, mistakes occur when legal teams fail to implement procedures to ensure that all relevant data is preserved and collected.


Virtualization and Security: Overcoming the Risks
First, virtualization adds additional layers of infrastructure complexity. This means monitoring for unusual events and anomalies also becomes more complex, which in turn makes it more difficult than it already is to identify security issues, such as advanced persistent threats. Next, virtualized environments are dynamic by design, rapidly changing on a regular basis. ... This is related to a phenomenon known as virtual sprawl, which refers to when the number of virtual machines in existence within an environment reaches a point where they can no longer be effectively managed, such as having all security patches properly applied. In such cases, the security of all virtual machines can no longer be guaranteed.


Rewrite 'absurdly complicated’ surveillance laws, say MPs
The first step, in a significant move towards greater transparency, is to consolidate the relevant legislation to publicly acknowledge all of the agencies’ intrusive capabilities. Where it is not practicable to specify the detail of intelligence arrangements in legislation, the MPs say the government should make it clear how these arrangements will work, for example through codes of practice. “We recognise that much of the detail regarding the agencies’ capabilities must be kept secret,” the MPs said. “There is, however, a great deal that can be discussed publicly and we believe the time has come for much greater openness and transparency regarding the agencies’ work."


5 steps to defining an effective IT strategy
A meaningful, transformative IT strategy will help businesses to understand how they can operate more effectively and efficiently, and will expose issues and bottlenecks that may be tripping them up, while articulating a vision for technology as a transformational force for the organisation. It should detail how businesses can use technology to innovate, extend their offerings and differentiate themselves from competitors, while reducing unnecessary spend, optimising processes and improving compliance. Defining an effective IT strategy can be complex. But if it’s well thought out and planned, businesses can notice massive, technology-driven changes.


How to Start With Security
Communities are only as strong as the contributions made by its members, so it’s important to give back. As you’re starting out, you may think you know very little, but even then it’s valuable to share. I blog about security and other topics at securesoftwaredev.com. It helps to organize thoughts, which is crucial when learning. You may also gain insights from comments that readers leave. Finally, you’ll get the pleasure of knowing that there are many others out there starting with security who would benefit from seeing they are not alone. You may even already have a security community in your company. For example, EMC has a Product Security Office, which provides me with a personal security adviser and all kinds of security-related training, documentation, and tools.


Why Is Cyber-Security a Process? This Is Why.
Cyber threats are about extraction: someone taking information you have and use it for some other purpose. Usually the threat is a thief who wants to extract money and keep it. Sometimes the threat is a thief who wants to extract something of value (credit card numbers, intellectual property) and sell it, or sometimes the threat is an opponent who wants to extract information and expose it, to force you to do something you might not otherwise do, like North Korea hacking Sony emails to pressure Sony into canceling “The Interview.” In almost every case, however, the activity that happens is extraction.


What will happen if Google and Microsoft leave the mapping world?
For map software customers this sudden shift in product focus emphasizes how unreliable it is to invest in geospatial technology from companies, no matter how big, that aren’t fully committed to Geographic Information Systems (or GIS, the geek terminology for mapping applications.) GIS enables individuals and organizations to make better decisions, save money, and improve the world. Really. Understanding and optimization are key to growing an organization or to deep-dive into complex issues that have local, regional or global impacts. Place and space are fundamental to human activity and natural environments, and GIS is ideally suited to help people better explore these systems.


The Changing business through digital transformation, welcome "d!conomy"
As growing digitization and evolving consumer demand rapidly change the marketplace, executives must find new ways to innovate for business advantage. By embracing digital transformation - the use of new technologies like cloud, mobile, Big Data, and social networks - companies can capitalize on new opportunities and optimize existing operations to achieve significant business improvement. But to transform themselves, they must have the right digital assets in place first to protect their own operations from disruption. It's clear to see that technology is disruptive. This is precisely why we need to talk about digital transformation. Driven by the combination of ever-growing digitization and evolving consumer demands, digital transformation is the use of new technologies to drive significant business improvements.


IoT Startups Need To Consider Their Business Models Carefully
Many companies in traditional business make a product, sell it on shelves and, hopefully, make a profit. Whether it is Philips’ Hue or Parrot’s Flower Power, one can understand why technology companies are choosing the same retail approach used by food, drink and clothes manufacturers. After all, for many digital companies, Internet Of Things devices represent the first physical embodiment in the real world, following a generation in which online, intangible development reigned supreme. But connected devices are not cans of beans or sweaters, and device makers do not need to limit their products to a single, one-time purchase event more commonly associated by perishable items.


5 Key Components of a Successful Enterprise Architecture Function
Creating and managing a successful Enterprise Architecture function requires a variety of different hard and soft skills. In addition, each company is different and the Enterprise Architecture function needs to calibrate and align itself to the specific company.  However, there are five common features of a successful Enterprise Architecture function that are applicable to all companies.



Quote for the day:

"If you ain't the lead dog, the scenery never changes." -- Lewis Grizzard

March 14, 2015

Announcing Spark 1.3!
The DataFrame API that we recently announced officially ships in Spark 1.3. DataFrames evolve Spark’s RDD model, making operations with structured datasets even faster and easier. They are inspired by, and fully interoperable with, Pandas and R data frames, and are available in Spark’s Java, Scala, and Python API’s as well as the upcoming (unreleased) R API. DataFrames introduce new simplified operators for filtering, aggregating, and projecting over large datasets. Internally, DataFrames leverage the Spark SQL logical optimizer to intelligently plan the physical execution of operations to work well on large datasets. This planning permeates all the way into physical storage, where optimizations such as predicate pushdown are applied based on analysis of user programs.


Criminals Leverage Apple Pay for Fraud: Banks Boost Authentication Security
Some banks are even asking customers to authorize their Apple Pay request by logging into their online bank account (which may or may not provide more security, as not all banks require strong authentication, making it easier for criminals to also get access to online bank accounts and verify Apple Pay card requests that way). Other banks are lacking in the basic security control that would allow them to compare the Apple Pay card numbers to card numbers that were previously reported as stolen, as some of the card data used by criminals were actually stolen from the Target and Home Depot breaches. If they were able to blacklist previously stolen card numbers, they could also significantly cut down on fraud carried out by Apple Pay.


Smart Watches Show More Style and Substance
Unlike the first round of smart watches, the LG Urbane or the Huawei Watch, both announced at MWC this week, might pass for conventional luxury timepieces when their round screens are in watch mode. Both are handsomely designed and come in multiple colors with metal and leather straps. Unlike most smart watches, which have toughened glass, the Huawei model, which goes on sale this summer, features a sapphire crystal face. Like most other smart watches on the market today, the Huawei device uses the Android Wear operating system. The Urbane comes in two versions: one that uses Android, and another that features WebOS—an operating system originally developed by HP for smartphones and tablets but now an open source project. Neither Huawei nor LG has announced a price for their devices.


People Remain the Weakest Link in Security
The trouble is we, the computer users, can be made aware of the risks and some simple steps to prevent opening a malicious link. However, we can hardly be blamed as some of them are incredibly sophisticated and are very hard to spot as being fraudulent. It is not just phishing emails which we are targeted by. Malvertising is also on the rise, where cybercrime gangs take out adverts on legitimate websites and use them to inject malware into unsuspecting people browsing the ad. The most recent Cisco Annual Security Report (CASR) suggested compromised users are often infected with malicious browser add-ons through the installation of bundled software (software distributed with another software package or product) via these sorts of malvertisments and usually without clear user consent.


IT security: from protector to business enabler in the app economy
To understand how many organizations are dealing with the new app economy, CA Technologies recently commissioned a broad study of a large cross-section of organizations. The full study results can be found here. One of the most striking results of this study was the emergence of business enablement as a primary driver behind security initiatives. In the past, protection of apps and data (including the related goals of breach prevention, regulatory compliance, etc) was the primary motivation behind most security programs. But, the app economy shows us that security can be used as a primary method of enabling new business initiatives, improving customer engagement and loyalty, and improving overall business agility.


2015 Information Governance Trends
While complications do exist with cloud deployments (such as companies that have regulation challenges operating within multiple jurisdictions or solutions that do not offer lifecycle management and governance capabilities), companies will have no choice but to look to deploy governance in the cloud on content that resides in uncontrolled environments. Executives will need to bring these systems under the corporate governance umbrella while ensuring employees are leveraging the capabilities of these systems. Simultaneously, Information Governance steering committees will look for easily available tools to begin rolling out the overall program.


Influential National Association of Insurance Commissioners (NAIC) Moves On Cyber
NAIC has coordinated two drafts which will provide comprehensive policy for oversight of insurance regarding cybersecurity: The first is a draft of Principles for Effective Cybersecurity Insurance Regulatory Guidance, developed by the Cybersecurity (EX) Task Force. This document will help state insurance departments identify uniform standards, promote accountability, and provide access to essential information. It also outlines the process for working with the insurance industry to identify risks and offer practical solutions. The second draft document: the Annual Statement Supplement for Cybersecurity policies, comes from the NAIC's Property and Casualty Insurance (C) Committee.


Why Apple may go its own way with wireless charging
"Apple has never bowed to a standards war. Apple does what they want," said John Perzow, vice president of market development for the Wireless Power Consortium (WPC), which promotes Qi, the most widely adopted wireless charging standard. Qi currently supports inductive, or tightly coupled wireless charging; that means a device must be placed in a specific spot on a charging pad. ... "Let's say for a second that Qi already launched its extension and could charge resonantly from a couple inches away," Perzow said. "I still don't think Apple would use it; then anyone could make a cool wireless charger for the Apple Watch, and Apple would lose revenue."


Reimagining The Network For A Hyper-Converged Infrastructure
In today’s mobile-first, application-rich, always-on world, our approach to infrastructure must be more holistic, and that means a shift to cloud-based architecture. ... Virtual overlays have rapidly emerged as the favored approach in this nascent market, with some very interesting startup plays and some big moves by incumbents. Despite being tethered to Cisco gear, Cisco’s Application Centric Infrastructure (ACI) stack technology is conceptually similar to virtual network overlays. Interestingly, Cisco now plans to support open source protocols on its switches to make it easier to implement virtual overlays for customers not buying into its ACI stack.


Microsoft and the Revolution: Analytics
By announcing the acquisition of Revolution Analytics, a company that in a just a few years has become a leading provider of predictive analytics solutions, Microsoft looks not just to strengthen its already wide analytics portfolio but, perhaps is also trying to increase its presence in the open source and data science communities, with the latter being one with huge future potential. An interesting movement no doubt, but… Was this acquisition one that Microsoft needed to boost its Analytics strategy against its biggest competitors? Will this movement really give Microsoft’s revolution a better entrance to the open source space, especially within the data science community? Is Microsoft ready for open source and vice versa?



Quote for the day:

"We need leadership that unifies and rallies people around shared causes, not pit members of society against each other." -- @ShawnUpchurch

March 13, 2015

5 Strategies for SMBs Looking to Leverage Wearable Tech
Although global companies are on the front lines of the wearables movement, taking advantage of things like Apple Watch for mobile payments and Google Glass for customer service, SMBs are taking a more reserved approach. Many are waiting to see how wearable devices are adopted by consumers before deciding for themselves how to best take advantage of the technology. ... As that interest grows, businesses of all sizes will have more opportunities to collect the types of consumer data that can fuel local marketing and sales growth. Here are five strategies for SMBs that are interested in utilizing wearable technology, either for marketing, operations, customer service, or any other avenue, from leaders in the wearable technology market.


Social media ROI smackdown: What your business can't afford to ignore
For brands and corporations, social media is a core part of efforts to engage customers, whether through digital marketing, service and support or other initiatives that touch buyers. The high value of social media is evident to virtually every marketing executive and practitioner. Despite obvious value, there are some who claim that social media offers little ROI. Among these are Frank V. Cespedes, a faculty member at the Harvard Business School. Frank published a post on the Harvard Business Review site arguing that most businesses do not gain sufficient ROI for their social media investments.Disagreeing with this perspective, I followed with a blog post explaining why I believe Frank is wrong. Several top marketing practitioners commented in support.


Top 10 strategic execution trends for 2015
Management styles have often followed what is fashionable, rather than using appropriate action for each initiative based on its characteristics and requirements. Agile software development is a current trend that is gathering steam and spreading to other functions in many organisations. This approach to providing only high-level goals and letting teams decide who, what, when and how much to do responds to two trends.  First, decentralising decisions is attractive to millennials, who have become accustomed to creating, reviewing and editing communications across all kinds of media, rather than simply consuming information.

Marshal your data with entity resolution
Rules for cleaning names, addresses, etc., are not iron-clad. With an entity analytics tool, a sliding scale can be used to tune the amount of fuzziness users wish to allow. This allows the user to determine, for example, whether he’d prefer more false positives or false negatives, or whether it’s necessary to adjust the formulas for data that is more reliable or less reliable. It can also be helpful in allowing a user to indicate how common a value is. For instance, in some data sets, someone living in Sacramento, California, might be unusual enough to enable the software to identify two people in different data sets as the same person. However, if there are a huge number of people in Northern California in a data set, Sacramento might be such a common location that relying on it to make a match is not safe.


Smartphones Tablets and Fraud: When Apathy Meets Security
Consumers rely on their mobile devices on an ever‐growing basis to keep them connected.   Smartphones and tablets provide them with access to each other through email, messaging, and social media while also puƫng financial services and shopping in the palm of their hands. And each and every one of these actvities holds value for criminals in search of account credentials and personally identifiable information (PII) to sell or misuse. Unfortunately, for all of the potential that mobile devices represent, the apathy of every mobile stakeholder is undermining the security of mobile devices and the accounts of their users.


Report says strong authentication use lagging in federal agencies
Not surprisingly, the report found that agencies with the weakest authentication profile allow the majority of unprivileged users to log-in using only a user ID and password. On the positive side, the Department of Commerce saw a dramatic increase in the use of strong authentication from 30 percent to 88 percent as compared to fiscal year 2013, while the Environmental Protection Agency jumped from 0 percent to 69 percent. In addition, the report showed that the average percentage of users across agencies required to log-on using Personal Identity Verification (PIV) cards rose from 67 percent to 72 percent, a 7.4 percent increase. The report highlighted two federal cybersecurity incident types where strong authentication potentially could have mitigated security issues


Q&A on Agile! The Good, the Hype and the Ugly
The great contribution is the sole focus on project progress, helped by the “three questions”: what did you do since last meeting, what are you going to do now, and what are the impediments. A key insight is that if the meetings are frequent, which does not have to mean daily, the sweet-talkers and hand-wavers cannot fool the others for very long: what you say today you will do is, at the next meeting, what you should say you have done; everyone will notice the discrepancies. The focus on impediments is also good, at least if you make sure people don’t use external impediments as an excuse for their own delays and mistakes.


Building trust: It’s not a one-and-done deal
Nothing erodes trust in a leader faster than broken promises. When you keep your promises, you build a track record of positive consistency, not a trail of disappointments and letdowns. Think about the last time you broke a promise to someone at work — what were the conditions surrounding the breakdown? Did you give false hope as a way to mitigate a disappointment you knew was inevitable? Did your overenthusiastic nature get in the way and you bit off more than you could chew? When someone makes a request and you know the answer is “no,” then it’s better to let them down immediately (with the appropriate explanation) than to string them along, hoping something will change for the better.


Inside Google's Insurance Data Strategy
Google has engaged Bolt Solutions, a vendor of software that enables direct sales of insurance, as a preferred vendor of software that connects insurance companies to the search engine. The platform handles accounting and monitoring for companies that choose to partner with the aggregator – pretty standard stuff, according to CEO Eric Gewirtzman. Bolt did not answer a follow-up question about what kind of data specifically passes between Google and the insurer through its platform by press time. Google also declined comment for this story. Bolt sees the opportunity to expand markets in the Google launch on the side of the carrier, not the search engine, Gewirtzman says.


Making the most of the 'Tech Cities' battle
In the midst of a protracted skills shortage, there's little room for employers to be complacent when it comes to finding the people with the right experience to fulfill IT and digital needs. The Tech Nation report revealed that 74% of digital companies in the UK now operate outside of London. The knock-on effect is that clusters of experienced IT professionals with the sought-after skills are moving outside of the obvious hiring grounds of London, leaving our capital's businesses with no choice but to extend their recruitment search across the UK for the skills they require.



Quote for the day:

"When you expect the best from people, you will often see more in them than they see in themselves." -- Mark Miller

March 12, 2015

Telerik Targets Cross-Platform Mobile with New NativeScript Project
Product manager Valio Stoychev said his favorite part of the NativeScript project was the library support, a feature also highly touted by coders taking part in the NativeScript Insiders beta experience. "We provide you with support for third-party native libraries out of the box," Stoychev said. "This is a huge thing. You'll be able to use any native Java or Objective-C library in your NativeScript project." While NativeScript aims to provide full code reuse for most situations, Telerik acknowledges some projects might require writing native code. "The answer to how NativeScript invokes native code again lies in the JavaScript VM APIs," said developer evangelist TJ Van Toll in a February blog post explaining How NativeScript Works.


IoT Adds New Wrinkle To MDM, BYOD
Every year, CIOs and IT managers are confronted with an ever increasing number of mobile devices used by their workers within their enterprises. In addition, these employee-owned devices are used to access, store, and work with corporate data, creating a huge potential for cybertheft. Now, however, it's not just smartphones. Executives and employees have access to a wide array of tablets, laptops, smartwatches, and Android Wear gadgets, as well as a growing number of devices that can be categorized as the Internet of Things. Mobile Device Management (MDM) has grown to a $2 billion industry in just a few years, and it's expected to grow to $4 billion by 2019.


Bidding farewell to Google Code
As developers migrated away from Google Code, a growing share of the remaining projects were spam or abuse. Lately, the administrative load has consisted almost exclusively of abuse management. After profiling non-abusive activity on Google Code, it has become clear to us that the service simply isn’t needed anymore. Beginning today, we have disabled new project creation on Google Code. We will be shutting down the service about 10 months from now on January 25th, 2016. Below, we provide links to migration tools designed to help you move your projects off of Google Code. We will also make ourselves available over the next three months to those projects that need help migrating from Google Code to other hosts.


20 years of a World Gone Digital
Here are some reflections on twenty years of a World gone social and digital, triggered by the fact that I passed the anniversary of my 8th year on Twitter at the weekend. Coincidentally, 14 February was the same day YouTube came in to being 10 years ago in 2005. It started me thinking about how so much of the social networking and mobile communications fabric that has changed our World and way of living and working so dramatically, only came in to being in the last 10 or 11 years. First let me say something about my 8 years living with Twitter. I’m a huge fan and a regular exponent. For those 3000 or so days I’ve tweeted on average more than 7 times a day.


Why IAM is topping security investments in 2015
Analyst and director at research firm Quocirca, Bob Tarzey, said IAM is key to implementing all IT security. “An increasing focus on IAM deployments is to extend them to outsiders and broaden the scope of access controls,” he said. According to Tarzey, this often means interfacing to multiple sources of identity or federating identity management.“This may well be the reason the UK is making IAM a higher priority than other European countries as UK organisations often take a lead in moving to online interaction with their customers,” he said.


Academic Study: Don't Bother To Refactor Code for Quality
The researchers defined refactoring as "the process of improving the design of existing code by changing its internal structure without affecting its external behavior, with the main aims of improving the quality of software product." "This study [indicates] that refactoring does not improve the code quality," concluded Sandeepa Harshanganie Kannagara and Dr. W. M. Janaka I. Wijayanayake in a reportpublished in January, titled "An Empirical Evaluation of Impact of Refactoring on Internal and External Measures of Code Quality." One measurement, however, indicated an improvement in a metric called the "maintainability index," which logically follows since refactored code should be easier to analyze and understand by humans and thus be easier to maintain.


How Do You Grade Out as a Negotiator?
"People do not do a good job learning from their experience," he says. "Some have gotten better about preparing for negotiation, but afterwards, they let the after-action review drop. It's all fine to read books and take courses, but we have this rich negotiation experience, and if we could tap it and analyze it in a meaningful way, it could lead to more improvement." With that in mind, Wheeler conceived of a new mobile app, Negotiation 360, which would supplement books and training courses to help people track their own negotiating experience. "A book is very linear," he says. Negotiation 360, by contrast, "is a template or matrix a user can make his or her own. It becomes their negotiating buddy."


How to break into the mobile app business with little cash and no programming skill
What if you're the one with the blockbuster idea and I, jaded old-school software entrepreneur that I am, just don't see it? In this article, I'm going to take you through the steps you need to get an app up on the Android and Apple app stores. I'll outline tools, resources, and steps you'll need to take. I'll even show you some tricks for building your own apps without any programming skill whatsoever. Whether you make any money is out of my hands. At least you'll have a starting point. Over the next weeks, I'll write more about how to really understand the software business. But for those of you who are impatient to get started, here's what you need to do.


Lawsuit seeks damages against automakers and their hackable cars
The suit claims that vehicles without proper electronics safeguards are "defective" and worth far less than similar non-defective vehicles and seeks unspecified monetary damages and injunctive relief. ... The lawsuit claims hackers could access ECUs on a vehicle's CAN bus and take control of basic functions such as braking, steering and acceleration, "and the driver of the vehicle would not be able to regain control. "Disturbingly, as defendants have known, their CAN bus-equipped vehicles for years have been (and currently are) susceptible to hacking, and their ECUs cannot detect and stop hacker attacks on the CAN buses. For this reason, defendants' vehicles are not secure, and are therefore not safe," the lawsuit states.


What Do We Know about Software Development in Startups?
In the startup context, customers often steer requirements, and developers must be ready to embrace change from day one. The use of architecture and design patterns to make features modular and independent is crucial when functionality is continuously updated or removed. Therefore, employing architectural practices and frameworks that enable easy extension of the design can dramatically benefit the alignment between the product and market uncertainty.9This requires some upfront effort but can prevent the growth of product complexity. Scientific evidence also points to the advantages of constant code refactoring. Reimplementing the whole system might be costly and risky if it must be immediately scalable to a growing number of users.



Quote for the day:

“A successful person is one who can lay a firm foundation with the bricks others have thrown at them" -- David Brinkley

March 11, 2015

Big Data: A Brief(ish) History Everyone Should Read
Long before computers (as we know them today) were commonplace, the idea that we were creating an ever-expanding body of knowledge ripe for analysis was popular in academia. Although it might be easy to forget, our increasing ability to store and analyze information has been a gradual evolution – although things certainly sped up at the end of the last century, with the invention of digital storage and the internet. With Big Data poised to go mainstream this year, here’s a brief(ish) look at the long history of thought and innovation which have led us to the dawn of the data age.


Baidu ends support for Android platform
"Because of a company business adjustment, we have no choice but to painfully decide to suspend updates and support to the Baidu Cloud OS," the team said in an official forum posting. While the rest of Baidu's consumer cloud business will still be in operation, the Cloud OS and ROM design unit has been folded into a new company, the team added in another posting. It did not offer details about the new company. The Baidu Cloud OS, launched in 2012, marked the Chinese search giant's attempt to bring more company services to smartphones.


Most Innovative Companies 2015: A Q&A With SmartThings Founder Alex Hawkinson
The developer community has really continued to grow quickly, which is so incredibly exciting to me and for everyone involved with SmartThings. The last numbers we disclosed in January during my keynote at CES were that the number of developers had more than doubled since the time of our merger with Samsung last August. More than 10,000 developers had actually published a running app (we call them SmartApps) or integrated device (we call them Device Handlers) in our platform by that time. ... Usage is very diverse, as we've found that smart homes, as they deepen, end up reflecting the personality and uniqueness of the person who lives in the home. However, there are some big patterns where we see use cases that are popular across much or all of the customer base.


Free eBook! Software Defined Storage for Dummies
Software defined storage is a relatively new concept in the computing and storage industry and can refer to many different technologies and implementations. Software defined storage is part of a larger industry trend that includes software defined networking (SDN) and software defined data centers (SDDC). At its most basic level, software defined storage is enterprise class storage that uses standard hardware with all the important storage and management functions performed in intelligent software. Software defined storage delivers automated, policy-driven, application-aware storage services through orchestration of the underlining storage infrastructure in support of an overall software defined environment. Standard hardware includes:


Anatomy of a Successful SAP Implementation
Dougherty knows that a major reason the SAP program was a success was how they trained people on the system. “We took 55 volunteers from across the business and put them through Airgas SAP boot camp,” he says. “They each did more than 120 classroom hours of training and became our dedicated trainers. We took them out of their day jobs, and they went from business unit to business unit six weeks prior to each rollout to train those associates. They were also on the ground for two to four weeks during post-go-live to ensure the associates were using the system properly.”


A Journey to IoT w/Father, Son, a Laser and Cats…Phase One
... Kitten Interaction Terminal- Nano Edition, this version would employee much smaller and less expensive components and be in a convenient casing Happy to say that we made our goal of showing our Phase One project at the IoTPhx meet up and received great feedback. Our question to the group was how to get to Phase Two and connect KIT to the Internet. There were suggestions about doing it connected to a computer and/or doing it all on the board. There is some new code coming soon to provide TCP/IP connectivity within the ChipKit Boards that looks promising that could make it stand-alone…Good Times!


Keep It Simple With New Backup Technologies
If you are still on the fence over whether or not to move from legacy backup technologies to the new, virtualized technologies, I like to use this analogy: think of your backup system as a kitchen that needs to be remodeled. In one type of remodeling project, you replace the appliances and cupboards and maybe lay down new flooring. The kitchen looks very different, but the functionality is exactly the same, and any of the old frustrations (like a lack of cooking prep space or no room for a table) go unaddressed. That’s your legacy backup system.


Cybersecurity has a talent shortage
The demand for information security professionals is quickly exceeding the number of people who are capable of doing the job, said Peter W. Singer, former director of the Center for 21st Century Security and Intelligence at Brookings Institute and a strategist at the New America Foundation, a public policy institute. "We don't have enough expertise in the right places now," said Singer, co-author of a recent book "Cybersecurity and Cyberwar". "We often frame cybersecurity as a technology problem. It is a human problem." While there isn't a single best solution to a complex shortage of candidates, Singer said, education should be a top priority in meeting anticipated needs. Many experts and policymakers also see institutional reform as a place to start.


10 surprising skills that will give IT job seekers the edge
Companies around the world are engaged in a fierce fight for talent. Especially in IT, the growth of new disciplines like big data, a need to understand the business and to be malleable in the face of change, and the impending retirement of legions of highly skilled baby boomers are presenting companies with unique IT hiring challenges. This is forcing companies to reevaluate what they look for in IT job candidates. Here are 10 emerging skills and qualities companies are looking for.


The Often Overlooked Skills and Responsibilities of a Technical Team Leader
Knowing the responsibilities, we may determine the necessary characteristics of such a key person in software development. First, I will point out several deficient views of a technical team leader, and why these views are incomplete and may not lead to team success. Then, I will categorize all the necessary responsibilities to be carried out by a technical team leader. Finally, I will discuss other functions in a typical software organization, and will explain why we shouldn’t overwhelm the team (and its leader) with such responsibilities.



Quote for the day:

"Never give an order that can't be obeyed." -- General Douglas MacArthur

March 10, 2015

These companies think the future of wearables is wellness, not watches
Whisper it, but if the trend at London's Wearable Technology Show is any indication then the future of wearables may not be in fitness. Yesterday, Apple announced a medical research platform in the form of Research kit and less than 24 hours afterward, the dominant theme is not about pleasing marathon runners. "There's a kudos in sport," says Smartlife's Martin Ashby -- one of the exhibitors at the show. "But the future of wearables is in health and wellbeing." It's a bold statement from the CEO of a smart sportswear company, but is it true that companies are looking to ditch fitness fans in favor of hospitals? If you're curious to read what others believe, keep reading.


Enterprise Architecture’s New Clothes
Digital as a trend is continuing its inexorable march into the enterprise, a fact that has not escaped the attention of many CIOs. According to the latest CSC CIO survey, a large proportion of CIOs is investing in new technologies to drive business innovation forward in their organizations. However, in working with our clients, we are finding that the issue of using new technologies is only part of the story. To become truly digital organizations and fully exploit new technologies and outside-in forces, they also have to change how their IT organization is organized, including IT’s (increasingly blurring) relationship with the rest of the organization.


Six entry-level cybersecurity job seeker failings
According to a poll last summer of 1,000 18–26 year olds conducted by Zogby Analytics and underwritten by Raytheon, about 40 percent of Millennials reported they would like to enter a career that makes the Internet safer, but roughly two-thirds of them said they aren’t sure exactly what the cybersecurity profession is, and 64 percent said that they did not have access to the classes necessary to build the skills required for a career in information security. That means, at least when it comes to the entry-level information security market, that there will be many job applicants continuing to enter the field with backgrounds that lack formal information security training. This echoes what we hear when we speak with CISOs and others who often hire security talent.


Automatic’s cool app for cars is coming to Apple Watch
Automatic is bringing some of these features to the Apple Watch, Automatic co-founder, Ljuba Miljkovic told me: “Because Automatic on the Apple Watch is an extension of the iPhone app, it’s technically able to present any alert the Automatic adapter can read from the car’s onboard computer. For now, we’ve focused on more frequent uses-cases like quickly seeing where you parked your car and easily tagging trips for business reimbursement.” One of the most useful features of Automatic is its ability to read data gathered by the processors inside modern vehicles, information you once needed expensive systems to access is now available to you through your phone.


‘Leap’ Second Poses Systems Challenge
A leap second is a one-second adjustment that is applied to in order to keep its time of day close to mean solar time. Without such a correction, time reckoned by Earth’s rotation drifts away from atomic time because of irregularities in the Earth’s rate of rotation. ... The problem is that most time synchronization systems in place today were implemented at a time when financial markets were still largely voice-based. Today, with transaction speeds being measured in nanoseconds, such systems are inexact. In order to mitigate the risks of inaccurate time stamps when disseminating and trading on sensitive market information, firms are implementing precision time stamps based on the atomic clock operated by the National Institute of Standards and Technology in Boulder, Colo.


One month to launch: A closer look at Apple's Watch
Despite the differences in materials, all three versions of the Apple Watch feel very similar once you've got 'em strapped on. The 42mm versions are just a touch more substantial thanks to the slightly bigger chassis and battery (I'm told the difference in battery life is super small), but you're not going to notice the difference. My go-to watch is a stainless steel Mondaine and the Watch felt dramatically heftier, only natural considering all the stuff that's been crammed into it -- it's also got more weight to it than an ASUS ZenWatch, the Android Wear watch that Apple's work most closely resembles. Don't worry: You might not love the shape, but the Watch feels suitably expensive.


Socially Exceptional Recruiting
With buzz around the value of social media in recruiting gaining steam — led by the growing popularity of professional networking website LinkedIn and social networking sites Facebook and Twitter — Molloy wanted to see if using these channels in talent acquisition was worthy of further attention. “We wanted to either prove that what people were saying and writing about social media recruiting was true,” said Molloy, now the Palo Alto, California-based firm’s senior manager of candidate development, “or that perhaps it was appropriate for marketing and other teams but not HR.” So Molloy and his staffing team at the cloud and virtualization software firm’s Cork, Ireland, office created a Facebook page and started to post jobs. He also had staff members post the openings to their own personal Facebook profiles.


Protecting the enterprise with cybersecure IT architecture
The trouble is, they’re in a race against time. A joint study by McKinsey and the World Economic Forum in 2014 revealed that 71 percent of global banking IT executives believe that attackers will continue to move faster than banks in modifying their skill sets and spotting potential vulnerabilities. Additionally, 80 percent of respondents believe that the risk of cyberattacks and compromised data will have major strategic implications for their businesses over the next five years. To stay ahead of attackers, companies need to design processes, platforms, and IT infrastructures with security in mind and incorporate secure architecture principles into their security programs.


Measure data science team efficiency with a feature-based approach
The trickiest part of measuring efficiency is figuring out your unit of measurement. I suggest you use a feature-based approach and develop an explicit definition of a feature. This concept was inspired by my work with Feature-Driven Development (FDD), an agile software development methodology that breaks a solution into many small features. I like feature-based measurement systems because they inherently reflect the end users' interests. A feature is something an end user will use, so it's a good basis for gauging how quickly something should be produced. Compare this with lines of code, which means nothing to an end user.


The power of doubt: Finding comfort in discomfort
CEOs insist that, despite the changing nature of their role, they remain “the ultimate decision makers,” providing clarity and direction. This clarity is ever more elusive in a world of intersecting trends, competing demands, and unpredictable ripples. Worse, what appears to be clear may in fact be a dangerous illusion, because “if you’re that clear, you’ve probably missed something.” Keen to protect themselves against this false sense of security and the risk of being blindsided, “a [certain] level of professional doubt should be the quality of any good leader,” says one CEO.



Quote for the day:

"Always do right. This will gratify some people and astonish the rest." -- Mark Twain