June 19, 2015

4 IoT Skills IT Pros Need
Accenture sees atomization as an extension of what is already happening. We're becoming a plug-in world. Imagine something like Google Maps. It is often embedded into other products, but still maintains a brand of its own. It is unlikely that each of your smart appliances will have its own interface with proprietary software. Why have a smart refrigerator with one experience, and a smart pantry with another? Instead, each will have an embedded food supply experience (perhaps an app for food ordering). A device might also have a temperature-control app, one monitoring energy use, and a recipe app that tells you what you can make from what you've got on hand.


Harnessing Big Data for Security: Intelligence in the Era of Cyber Warfare.
It is crystal clear that for security agencies and governments to effectively fight terrorism, they must equally invest in dynamic pool of digital talent that will ignite a seamless network of smart, agile adaptive and disruptive army of Cyber-genius credentials. It is possible! ... Thinks tanks must be created, digital resources must be mobilized and brows must be knit as the mind retires into depths of thought that would yield remarkable new streak of innovations that will not only anayze the huge gig data piles around us, but also invent brand new intelligence tools that must work smart round the clock to process Big Data into actionable and smart information to enhance security.


Blended Analytics: The Secret Sauce of ITOA
One of the most talked about topics in IT has been IT Operations Analytics(ITOA). Leading vendors and start-ups have made significant progress in leveraging analytics to offer better IT operational insights. However, available ITOA solutions still struggle to make sense of IT Big Data, which perpetuates operations in narrow silos. IT decision makers need to finally break these silos, by applying an approach that blends and analyzes all relevant sources of IT information. Extracting insights and drawing intelligent correlations from a variety of data, Blended Analytics helps to see beyond individual components and finally draw insights based on the whole picture.


Wearables for workplace wellness face federal scrutiny
"There may be instances where people are ostracized for not participating in a wellness plan, and they may pay more for insurance," Gownder said in an interview. "Wearables have a lot to offer, and it's fantastic if an organization improves the health of its employees and engineers discounts with lower rates for the firm. But the dark side of this is that if enough people cede their rights to privacy and part of a system is tracked … it could put those who didn't participate at a disadvantage." Gownder said an employee might have a legitimate reason not to be physically active, because of a disability, including a mental illness, for example.


Gear up for tougher privacy regulation, says PwC lawyer
According to Room, the big picture from these two cases is the movement to a “two-pronged onslaught” against the business community and the public sector as a result of the battle for power between citizen activists and regulators. “Whatever individuals try to do to get the likes of Facebook and Google to improve privacy will be met by increased aggression towards business by the regulators,” he said. Room believes that the natural consequence of the battle between the citizen and the regulators will be that regulators will gradually become equipped with greater powers. “When they have this new power, they are going to use it, and companies are going to be audited to high heaven and inundated with demands to complete privacy impact assessments,” he said.


What the Spinoff May Mean for Raritan’s DCIM Business
Robert Neave, CTO and co-founder of Nlyte Software, one of the leading a pure-play DCIM vendors, said Sunbird’s future success or failure will hinge on its ability to make it easier for customers to use its software together with other data center management systems, namely IT service management software, or ITSM. Raritan took a big step in that direction in May, announcing a DCIM connector for ServiceNow, one of the most popular ITSM solutions. DCIM overall is evolving to become part of ITSM, Neave said. Raritan acknowledged this in its ServiceNow announcement. Customers that use DCIM in this context will prefer to be able to configure it to gel with their ITSM software by themselves, without spending time and money on specialist services, Neave said.


Just because your business is boring, doesn't mean they're not out to get you
A company's most basic line of defense should be to "distrust, verify, and contrast", according to Molist and Medina. Simply put, that's "think before you click" and when in doubt, go back to the source of the email - your bank or coworker - through a different channel, such as on the phone, and double check if they really did try to contact you. And, of course, have a regularly-updated, active, and properly-configured antivirus package and firewall. That advice extends to mobile devices as well as PCs and laptops. According to Medina, attacks on mobile devices are beginning to overtake those targeting desktops. Mobile attacks are a particular problem for online banking, given people use the same device to access their bank's website or app as well receive the SMS alert they use for two-factor authentication for the same service.


Information Is the Ichor of Your Organization
It is now considered somewhat corny to say, “Information is the business currency of the 21st century.” And why not? We often make or hear this statement. Is it that it is so obvious or that we do not understand the profundity of the statement? Who knows? I must admit that it took me a while to get past the banality of the statement and truly understand the meaning. So what does it really mean? Well, we create value by powerful or novel business ideas and technologies. It is the flow of information into the act of creation by managers and organizations that differentiates organizations and provides value. All business is information—amassing, creating, refining, combining, processing and delivering information.


Five cyber spy technologies that cannot be stopped by going offline
Any operational device that is connected to a power line generates electromagnetic radiation that can be intercepted by proven technologies. Almost half a century ago, state security services of the U.S. and the USSR were concerned with such leakages, and the information that has been obtained since those days is massive. Some parts of the American activity are known under the TEMPEST abbreviation, and some declassified archives reads as good as detective novels. Despite the long history, new methods of ‘surfing’ electromagnetic waves appear regularly as the electrical equipment evolves. In the past, the weakest links were CRT monitors and unshielded VGA cables that produced electromagnetic noise. Keyboards have become favorite toys for data security researchers over the past few years. The research in this area has been steadily productive.


Structured Complexity - better security models to reduce risk
A good security model needs to be able to be evaluated and, ideally, even mathematically validated. To achieve this it needs to be well structured and be clearly linked to what the business requires. Taking a step back, this firstly requires clearly articulated business objectives linked to a business strategy. This strategy is then used to define business requirements and an appropriate enterprise architecture can be designed. Once we have this master plan we can start building our enterprise security architecture. I would argue that this can be done for any size of organisation, but is not necessarily always required to the same level of detail. Once we have the overall master plan and enterprise architecture, an organisation should identify three components, prior to designing a derived enterprise security architecture:



Quote for the day:

"The best way to find out if you can trust somebody is to trust them." -- Ernest Hemingway

June 18, 2015

Security—A Perpetual War: Lessons from Nature
A phishing website’s main goal is to masquerade as a legitimate website and make users give out their secrets (password, credit card number, or the like). Thus, the essence of this attack technique is to attract victims and fool them into swallowing the bait. Many predators in the animal and plant kingdoms have long used this technique. For example, the Anglerfish (Lophius Piscatorius), sometimes referred to as the “sea-devil,” has 80 long filaments along the middle of its head; the most important filament is the longest one, which terminates in a lappet that can move in every direction. This lure attracts other fish; the Anglerfish then seizes them with its enormous jaws as they approach.


Why VMware may fall victim to virtualization cost cutting
The report's authors define shadow data as all of the "potentially risky data exposures lurking in sanctioned cloud apps, due to lack of knowledge of the type of data being uploaded, and how it is being shared." Based in San Jose, Calif., Elastica provides cloud application security services that rely on data science algorithms. It is not enough, according to Elastica, to understand shadow IT -- evaluating cloud apps on an enterprise scale requires the use of data science methods that analyze files and cloud transactions, in order to classify data and identify threats to security and compliance. A set of sophisticated analysis tools is probably called for, since they found the average number of cloud apps in an enterprise was an eye-popping 774.


Companies Should Heed DOJ’s New Cybersecurity Guidance to Minimize Liability
In releasing its “Best Practices for Victim Response and Reporting of Cyber Incidents,” the DOJ's Cybersecurity Unit called upon law enforcement and private industry to share in the effort to improve systems that protect consumer information. The Guidance sets forth detailed steps to improve cybersecurity and breach response at all stages within the breach lifecycle, ranging from preparation and deterrence to incident notification, response and, ultimately, remediation. The DOJ standards are being viewed by many industry observers as the new benchmark against which corporate cyber-incident preparedness and response efforts may be measured. Although the proposed standards may not apply to all organizations in all instances, companies of all sizes would be ill-advised to ignore them.


Google is taking a page from Facebook and starting to talk about its homegrown hardware
Historically, Google has treated its homegrown hardware as a trade secret, unwilling to discuss it. But this week, Google took a big step and started talking more openly, particularly about the networking tech it's invented. Two things caused Google to change its mind: One is that its rival down the road, Facebook, has not only been talking about its own technology, but created an open source hardware foundation to give those designs away to anyone for free. The Open Compute Project allows anyone to use those designs, modify them, and share improvements that Facebook can use in turn. Contract manufacturers are standing by to build the hardware.


6 Survival Strategies for CIOs
Companies often talk about “IT” and “the business” as if they were totally separate entities, but information technology now touches almost every facet of the organization. Leadership and digital leadership must become one and the same, but this doesn’t happen easily when business and IT professionals have spent their careers isolated from each other. A survey conducted by CSC’s Leading Edge Forum (2014 Outside-In Barometer) shows that most business executives still view IT as a back-office function, known for stability rather than disruption. As a result, we’ve seen other leaders emerge to challenge the CIO for dominance. In this type of environment, how can a CIO stay relevant? As investments for digital innovation increase, how can CIOs ensure this money is allocated to them? Here are six strategies for doing so:


Is Complexity the Downfall of IT Security?
The problem with an extremely complex security system is reasonably obvious if you think about it, but it may be helpful to consider a somewhat similar situation: reliability. When building an airplane, for instance, engineers will add redundancy to the various systems to ensure that if one fails, a standby system is ready to take over. One might think, on first glance, that the engineers could achieve almost any reliability level they wanted simply by adding more and more redundancy. But the problem is that in addition to just the redundant system—say, rudder control—there must also be a system that manages the transfer in the event of a failure. But even that system is subject to failure and may require redundancy. The gist of the matter is that beyond a certain point, additional redundancy can actually harm reliability, contrary to what intuition would dictate.


Tomomi Imura on Mobile Web, Future of CSS
Currently so many developers depend on preprocessors such as Sass or Less because there are so many features that we want to use that are missing from the current web standard. First of all we have so many different browsers means we need to have a browser specific prefix, so if we want to support new features like animations, we have to add browser prefix, the vendor prefix for each one of them and that can be really long, so we want to get rid of those and by using preprocessor. Or I would say variables, if we want to set some colors to certain variables we can reuse the same variable or we don’t have to keep changing each time in design I make changes, right? So this is not doable yet with current CSS but now we have a new standard that is coming, there is a proposal about CSS variables and other things that close a gap in between current standard and something that preprocessors do, so that would be really wonderful news to us.


Lawmaker Urges U.S. Personnel Office Chief to Quit Over Hacking
In testimony before being questioned, Archuleta said the agency fends off an average of 10 million hacking attempts a month and the attacks will increase. “Government and non-government entities are under constant attack by evolving and advanced persistent threats and criminal actors,” she said. Archuleta said the detection of the attacks was an example of improved security monitoring by the agency. “We discovered these intrusions because of our increased efforts in the last 18 months to improve cybersecurity at OPM, not despite them,” Archuleta said. However, lawmakers cited a report from OPM’s inspector general last year that recommended Archuleta shut computer systems that lacked security validations. Archuleta said she didn’t disable the systems because it could have negatively affected other databases and records.


Cut big data blending time from several months to several hours
"There are two approaches when it comes to preparing big data for analytics," said Merritt. "The first approach is building a data warehouse, which is defined and designed by business users and IT. This data warehouse is usually built from system of record and transactional data. The data is also cleaned and checked for quality with an ETL (extract, transform, load) process before it is blended. The second approach is what we focus on. This is a self-service data preparation approach that is especially designed for business users who have a need to prepare and query big data without support from IT. They can pull in data from different sources and work with data organization in formats that are already familiar to them."



Intelligent machines part 2: Big data, machine learning and its challenges
Although deep learning has proven to be a powerful form of machine learning over recent years, its expense might not yield much higher performance on certain tasks, says Robin Anil, an ex-Googler who left the company this year to work on statup Tock with other former Google staff. “The places where deep learning have given large improvement are on things like image recognition where traditional algorithms like logistic regression did not do well. “You might be able to get small improvements by applying deep leaning into an existing problem that has already been solved using logistic regression, but that small improvement and the amount of compute power that you use may not be worth it,” Anil points out.



Quote for the day:

"If you just focus on the smallest details, you never get the big picture right." -- Leroy Hood

June 17, 2015

Enterprises will take up wearables for the internet of things, say researchers
According to Martin, wearables have the potential to become an interface for industrial IoT access. In May 2015, Beecham Research warned that the IoT industry needed to do more to secure data. According to Beecham Research technology director Jon Howes, the only reason there have not been any serious IoT breaches already is because the IoT has not yet been deployed in the large-scale consumer or enterprise applications that would make them attractive to attackers. “Traditional M2M applications are typically very focused, using specific edge devices, a single network and custom platform, making it relatively easy for security professionals to secure to the acceptable level,” he said.


Should Your Self-Driving Car Be Programmed To Kill You If It Means Saving A Dozen Other Lives?
What would a computer do? What should a Google, Tesla or Volvo automated car be programmed to do when a crash is unavoidable and it needs to calculate all possible trajectories and the safest end scenario? As it stands, Americans take around 250 billion vehicle trips killing roughly 30,000 people in traffic accidents annually, something we generally view as an acceptable-but-horrible cost for the convenience. Companies like Google argue that automated cars would dramatically reduce fatality totals, but with a few notable caveats and an obvious loss of control.


Demand for Enterprise Mobile Apps Will Outstrip Available Development Capacity
According to Gartner, employees in today's digital workplace use an average of three different devices in their daily routine, which will increase to five or six devices as technologies such as wearable devices and the Internet of Things (IoT) eventually become mainstream. Many of these employees are given the autonomy to choose the devices, apps and even the processes with which to complete a task. This is placing an increasing amount of pressure on IT to develop a larger variety of mobile apps in shorter time frames. Despite this, a Gartner survey on mobile app development conducted in 2014 found that the majority of organizations have developed and released fewer than 10 apps, with a significant number of respondents not having released any mobile apps at all.


Google-infused storage startup Cohesity reveals itself
Part of Cohesity’s attraction to investors and early customers is its rich Google pedigree: Aron worked on the Google File System that the search giant relies on for core data storage and access, and about a quarter of the 30 engineers on his 50-person team come from Google as well. What’s more, Google Ventures is among Cohesity’s backers (at least Google makes some money off its ex-employees’ efforts this way, the 41-year-old entrepreneur quips). Google, which has gained a reputation for building its own infrastructure technology, isn’t using the startup’s gear yet, but Aron says maybe someday…


3 Ways to Fail Intelligently to Innovate Yourself
creative, personal, or professional is not about sidestepping failure. On the contrary, it is about stepping into failure but doing so with the right perspective. Most of life is about perspective: almost all of the research done with people who are in their senior years who are happy with their lives points to this: It doesn’t matter how rich you are, how much professional success you have had or haven’t had how many tragedies you’ve endured. None of those are the primary predictors for life satisfaction. The major determining variable is perspective: knowing what matters and what to focus on. When we focus on our fears of loss and tend to blame ourselves when things don’t work out, we may miss the larger picture that is key for success.


Pervasive Community, Data, Devices, and Intelligence
After all, the whole point of digital transformation is realizing that technology fundamentally changes how you do business in just about every way. It therefore poses very difficult questions to business and technology leaders: Who best should do our work today? Where does the value come from? What do these new ways of working actually look like? How can we best organize to achieve them? To answer these questions, we must understand the overall narrative of our modern digital journey: Where is technology actually taking us? What is it making possible that wasn’t before? How can these possibilities give rise to uniquely valuable new types of assets that would allow us to sustain our businesses?


The next wave of IT fadeouts
IT and its hosting enterprises have passed through monumental changes over the past decade. Through it all, CIOs have maintained a strategic eye on 'next thing' technologies. However, with relatively flat IT budgets, they have also looked for IT investments that are on the decline. Some of these technology fadeouts are internal approaches to IT and general business operations and management that just don't seem to work well any more. Others involve a particular technology solution that has seen its day. In both cases, the end results will have dramatic impact on the technology choices that businesses will make. What are the likely technology fadeouts?


System programmers build a cloud, IT automation foundation
We could let professional services do all this integration and automation for us. I'm skeptical, though. Consultants don't have our organization's evolving long-term best interests in mind. They want to do a job, call it done and move on. They're not going to be there when something breaks. They're not going to be there when it needs a security patch. And they don't improve our organization's understanding of the technology we rely on. We could resurrect the idea of system programmers, and hire some of our own. Should they have everything we usually look for in an IT staff hire? Yes. But instead of the business degree, perhaps we look to the computer sciences and software development fields.


How Private PaaS Can Help Organisations Deliver On Their Hybrid Cloud Strategies


By decoupling applications from their underlying infrastructure, enterprise development teams can start to securely deliver an entire ecosystem of data, services, applications and APIs to both internal and external customers across any infrastructure. Software becomes increasingly valuable, while technology is effectively delivered as a self-service utility.

 Managed by central IT, a Private PaaS can effectively empower developers anywhere in the business by giving them the freedom and simplicity of a self-service, policy-driven PaaS that can overly both internal IT and the public cloud. By abstracting applications from their underlying infrastructure, running a private Platform-as-a-Service can successfully bridge public IaaS and internal IT to empower hybrid cloud strategies.


Towards a body-on-a-chip
The chips do not contain complete organs, just the smallest colonies of cells necessary to replicate the function of one. CN Bio’s liver chip, which is based on work carried out in partnership with Linda Griffith and her colleagues at the Massachusetts Institute of Technology (MIT), uses tiny “scaffolds” to hold cells from donated organs which, for various reasons, were deemed unsuitable for transplant. The cells can be kept frozen until required.  The scaffolds are placed into small wells and fed with a suitable fluid along the channels. After a few days spent settling down, the cells are ready for work and are infected with hepatitis B. As the human form of the disease can be replicated only in primates, dozens of chimpanzees would otherwise be required for just one experiment.



Quote for the day:

"We must learn to accept finite disappointment, but never lose infinite hope," -- Martin Luther King, Jr.

June 16, 2015

Big Data Bets In The Cloud
Less clear is the degree to which smaller cloud service providers will be able to withstand this level of competition over the long haul. No sooner did AWS unfurl its M4 service, it also announced price reductions on its M3 and C4 cloud services by five percent. That may not seem like much but as part of a consistent pricing strategy where AWS price cuts are soon followed by similar price cuts from Microsoft and Google the economic pressure on smaller cloud service providers mounts. The good news is that the existence of faster processors means it’s also now possible for all cloud service providers to reduce the number of servers they need to deploy to support any given set of application workloads, making them all more economically efficient.


Why coders get into 'religious wars' over programming languages
Python vs. Java is a popular ongoing argument, for instance, as is Java vs.Google's Go, or Java vs. Ruby, or really Java vs. any other language. Java, an old workhorse of website app development, is both really common and very poorly-regarded, which leads to no shortage of programmers insisting that its time has passed and suggesting a faster, more modern replacement. More recently, a hot topic has been Objective-C, the language in which most iPhone apps are written, versus Apple's Swift. Apple is positioning Swift as Objective-C's natural successor, promising that it's both easier to write apps with and that the apps themselves are faster. Swift is growing very rapidly, but it's still a fraction of the overall iPhone/iPad development scene.


Building a Better VMM: 8 Ideas
Even if you don’t use VMM, this article is for you. If you have Hyper-V but not VMM, then that is something that Microsoft seriously needs to address whether you (or they) realize it or not. I believe that there should be a set of free tools with a premium management pack. The free tools should be enough for anyone to get by with minimal stress and the premium tool should not be required but it should provide a value-add that exceeds its price point. It should also either be a plug-in to the free tools or it should be able to do everything that they do so that a premium user doesn’t need to flip between tools. As these products stand today, none of those things are true. That’s part of the reason so many people aren’t using VMM. What I really want to focus on is the problems in the VMM product.


Create an efficient data management process in the enterprise
Integration is an important issue in the data management process. To set up tiers, a company must have data storage management software capable of moving information among different hardware systems. Modern IT organizations are rarely willing or able to standardize on one application platform. A data solution, therefore, needs to support multiple platforms, such as Linux and Windows, as well as VMware and Microsoft Hyper-V virtualization, with data protection. Standards allow information to flow among the various storage and processing systems. IT is able to store, relate, classify and search for data across the enterprise only when those pieces are in place.


The Evolution Of Hybrid IT
So, unlike dealing with a telco, where you as a customer deal with one entity and that one entity provides the connectivity, the data centre, potentially the hosting space and maybe some cloud services and so on, a lot of enterprises now are moving to hybrid IT environments and hybrid cloud environments. So, they're dealing with potentially multiple network service providers, multiple data centre operators and multiple cloud operators, and they're having to write a lot of interfaces, a lot of different ways to talk to all these various endpoints. There's not a consistent security model, there's not a consistent privacy management module, and there's not consistent policy management, all the kinds of things that enterprises need in order to integrate systems into their overall IT architecture.


Bankers Debate Privacy, Security Trade-Offs of Mobile Apps
"The biggest issue that bankers need to contend with is that in contrast to the early days of the Internet, where we had two operating systems and maybe three browsers … now we have 2.6 million apps you can potentially download to your phone," O'Neill said. "Throw in another half-million apps that Amazon is introducing for Kindle, and you have a cornucopia of back-door opportunities for malware." Cybercriminals can now use customer smartphones to create millions of potential points of attack into banks' systems, O'Neill said. He cited a recent incident linked to the release of the satirical film The Interview, which lampooned North Korean dictator Kim Jong-un, as one example of the threat posed by mobile apps.


Indian Big Data Momentum Intensifies, Says Pulak Ghosh, UN Big Data Expert
Appreciation of analytics is gaining momentum with an exponential rate! Already convinced players like, banks, e-commerce companies are taking the analytics expertise to the next level. While, Citi, HSBC, HDFC, ICICI and Axis bank has now a dedicated team to look at problems using advanced analytics, the largest commercial bank of India, State Bank of India has started a vertical on analytics with balanced group comprising of several statisticians, banking professionals and computer scientist to develop advanced analytics methods. Coming to retail, Amazon and FlipKart started betting on their data following the early success stories scripted by the banks. Snapdeal has also started analytics recently. More and more firms are today convinced that there is a great deal of competitive advantage in taking decision which is supported by findings through analytics.


How to Improve Product Development by Integrating Design Thinking with MVP
Design thinking is an approach that involves the application of empathy to problem solving, matching the things people need with technologically feasible and viable solutions available today. Empathy lets us feel what it’s like to be in someone else's shoes, to create customer-centric products and solutions to meet specific customer needs. As a framework for product development, design thinking is a human-centered, interactive learning process that focuses on customers as people with defined needs, and works backward to a technology solution. This provides a level of clarity on business objectives and a deeper understanding of the way a company’s products are valued in a marketplace.


Cybersecurity first responders give advice on data breach aftermath
“The first step is definitely supporting the customer who is reporting the incident - in order to avoid panic,” says Forte. Forte has extensive real-world experience as a cybersecurity first responder. He has 15 years experience in the Italian military and financial police, and has worked in the United States with NASA and many federal agencies. In both countries, Forte has managed information security strategies and undertook incident management and digital investigations. He is currently the Italian Chief of Delegation and a Subject Matter Expert and Co-Editor serving the Italian Delegation for ISO Standards on Digital Evidence and Investigations, and Incident Management.


Female CIOs winning bigger budget increases than male IT chiefs
"Female CIOs are significantly more likely to express concern that investments in risk management and risk management practices are not keeping up with new and higher levels of risk in a more digital world," said the research. Seventy-six percent of female CIOs expressed this concern about risk investments as opposed to 67 percent of male heads of IT. The analyst in charge of the research, Gartner fellow Tina Nunno, said this is part of the reason that women are more successful than men at getting approval for large budgets. "It seems that women just tell a better story," said Nunno. This is true regardless of whether the female CIO is reporting into a male or female boss, a CFO or a CEO, Nunno said.



Quote for the day:

“Pivoting is not the end of the disruption process, but the beginning of the next leg of your journey.” -- Jay Samit

June 15, 2015

​Data privacy: You may call it personal data but who actually owns it?
"The current ambitions of those with money and those with aspirations to spend our money are that they want sensors everywhere. They want unlimited data collection and controls merely on use," he said. "The only way we're all going to be able to stem collection and stem deployment is by the compulsion that it has to be open and the implication of it being open is you don't want just anybody being able to place an entire city under surveillance." That principle of transparency is going to be increasingly important for privacy, particularly with the impending introduction of new European data-protection laws, according to partner at Irwin Mitchell and expert in data privacy law Joanne Bone.


"I Want it Yesterday" syndrome and its cure
I asked, when do you want this product? He replied, I want it yesterday. Something snapped in my mind. I immediately replied, great, we have exactly one year then, as yesterday will only come next year. Everyone in the room laughed. And, may be that is when he decided not to engage with us. Having seen many managers use this phrase to indicate urgency and indicate how far behind them their team is whereas they really are much ahead in their thinking, I thought, it worked very well to counter the implicit insult and ego-trips of the big bosses that we have created as our managers.


How Snapchat's CEO Plans to Conquer the Advertising World
Advertising is definitely starting to roll in. McDonald's and Samsung have come aboard, while Macy's recently sponsored People's Discover feed. Movie studios are also playing with the app. The big summer releases Mad Max: Fury Road, Pitch Perfect 2 and Jurassic World all were heavily promoted on the app. Speaking on the condition of anonymity, the buyer says Snapchat is starting to live up to its potential in social media marketing. "It's actually quite a mature company," the exec adds. "A lot of companies come out and don't have their acts together."


Top five reasons companies are avoiding managed services
For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. The managed service provider can improve efficiency, reliability, security, and maintenance -- all while lowering costs and freeing up IT staff to work on more strategic projects.But according to a new study from CompTIA, the companies that don't use MSPs are more certain of that path than ever. In 2013, 7 percent of companies not using MSPs said they had no plans to start using them in the future. This year, that number jumped to 31 percent. Here are the top reasons why companies are avoiding MSPs.


Transforming an Analog Company into a Digital Company
Various reasons have been suggested to explain why banking has changed relatively little. First, the industry is subject to heavy regulation and government intervention. This discourages potential new entrants, so incumbent banks feel less pressure to change. Another factor often pointed to is average user age, which is higher than that seen in other industries—such as music. What’s more, most people take a conservative approach to their finances. And it may well be that the rapid growth and high earnings of the financial services industry in the years leading up to the downturn nurtured complacency and inefficiencies which in other sectors would have proved fatal.


Inside Apache HBase’s New Support for MOBs
The HBase MOB design is similar to the HBase + HDFS approach because we store the metadata and MOBs separately. However, the difference lies in a server-side design: memstore caches the MOBs before they are flushed to disk, the MOBs are written into a HFile called “MOB file” in each flush, and each MOB file has multiple entries instead of single file in HDFS for each MOB. This MOB file is stored in a special region. All the read and write can be used by the current HBase APIs. ... The MOB edits are larger than usual. In the sync, the corresponding I/O is larger too, which can slow down the sync operations of WAL. If there are other regions that share the same WAL, the write latency of these regions can be affected. However, if the data consistency and non-volatility are needed, WAL is a must.


A Day In The Life Of Tim Holman
We work as cybersecurity experts for many different types of businesses across the UK. If someone rings out of the blue and tells me that their business has been compromised by a cyberattack, then our day (and sometimes much of the night) is spent detecting the attack, preventing access to IT systems, removing vulnerabilities, and starting the long process of communicating with customers and stakeholders and cleaning and protecting all their IT processes and systems. It is not uncommon to see a business being brought to its knees by what appears to be an innocuous theft or other lapse in security.  ... The best jobs are the clients that call us before anything disastrous has happened. They realise that they are at risk, so they contact us to do a thorough security assessment so that we can identify the vulnerabilities and advise on next steps.


IBM Invests to Help Open-Source Big Data Software — and Itself
With its Spark initiative, analysts said, IBM wants to lend a hand to an open-source project, woo developers and strengthen its position in the fast-evolving market for big data software. By aligning itself with a popular open-source project, IBM, they said, hopes to attract more software engineers to use its big data software tools, too. “It’s first and foremost a play for the minds — and hearts — of developers,” said Dan Vesset, an analyst at IDC. IBM is investing in its own future as much as it is contributing to Spark. IBM needs a technology ecosystem, where it is a player and has influence, even if it does not immediately profit from it. IBM mainly makes its living selling applications, often tailored to individual companies, which address challenges in their business like marketing, customer service, supply-chain management and developing new products and services.


The Power of Software Ecosystems
It doesn’t surprise me that Automic has established a plug-in marketplace. In fact, it seems like a natural evolution. When you’ve worked in the IT industry for a while, you realize that there is a strong motivation for greater collaboration between software users in one way or another. The “impulse to share software” has been a part of the IT world for many years, from the early days of rekeying articles published in magazines through to sharing code using floppy discs and more recently over the Web. The emergence of software sharing ecosystems has provoked many related or parallel trends for both collaboration and software marketing, from Open Source to Apple’s App Store.


IBM's Analytics Strategy: A Closer Look
IBM’s objective is to make such prescriptive analytics useful to a wider audience. It plans to infuse optimization capabilities it into all of its analytical applications. Optimization can be used on a scale from large to small. Large-scale optimization supports strategic breakthroughs or major shifts in business models. Yet there also are many more ways that the use of optimization techniques embedded in a business application – micro-optimization – can be applied to business. In sales, for example, it can be applied to territory assignments taking into account multiple factors. In addition to making a fair distribution of total revenue potential, it can factor in other characteristics such as the size or profitability of the accounts, a maximum or minimum number of buying units and travel requirements for the sales representative.



Quote for the day:

"Always mistrust a subordinate who never finds fault with his superior." -- J.C. Collins

June14, 2015

Big Data and IT-Enabled Services: Ecosystem and Coevolution?
Services, rather than products, are increasingly viewed as the main driver in business and economic growth. 8 Ever more services are available in industries such as healthcare, finance, education, and marketing. Even manufacturing companies are transforming their businesses to be service-oriented. 9 IT has been a powerful enabler behind these transformations and innovations. For example, the benefits of customer relationship management (CRM), a popular service for customer acquisition and retention, can’t be fully realized without IT. Similarly, contemporary services such as e-healthcare, electronic financial services, and e-logistics aren’t possible without IT’s enabling role.


Rise and rise of Internet of Things in India
There's no doubt that the increasing adoption of IoT will certainly have an impact on the job market in India. Some current roles will become redundant. It should, however, also create new opportunities, some of which we cannot even envision today. There will be new opportunities in traditional verticals. Software development, data management, analytics are all areas that should see strong growth as IoT adoption gains momentum. At the same time, some new hybrid verticals (like IT + Medicine) may emerge. Adjusting to changes and learning to work differently, even in traditional roles, in the connected world will be a key to success in the IoT age.


Entering The Digital Economy? Look Beyond The Technology
As the customer experience continues to become increasingly digital, the buying journey and sales pipeline are accelerating at a dizzying pace. There are many more opportunities to initiate transactions, for customers to make requests to businesses, and for businesses to deliver those demands within a time frame the customer expects. As a result, processes have to be instrumented – leading to automation. “The Rise and Implications of Economic Hyperconnectivity,” Pete Swabey, senior editor of technology at EIU, supports this reality by stating, “Where things get really interesting is when those demand signals are fed back into the supply chain. And we have automated systems that draw patterns in demand signals and then pump them into the supply in a market without any human interaction.”


5 Ways To Increase API Adoption
When looking to increase the adoption rate of your application programming interface, or API, these are certainly a few of the questions you should be asking. While APIs and the developers who use them may be working in a unique and different language from the rest of the business world, there’s no doubt that the formula used to grow the popularity, fan base and brand advocates behind a consumer product is the same when applied to the API economy. Inspired by the talk given by ex-ProgrammableWeb editor and CenturyLink Cloud developer content lead Adam DuVander at the 2014 APIcon UK, this piece looks to offer you the tried-and-true principles of marketing, sales, customer service and brand advocacy that come together as a sure-fire way to increase your API adoption.


The Importance Of “Cultural Alignment” for Global Creativity
How does culture impact creativity? What is the difference between “local” and “foreign” creative tasks? And what does that all have to do with crowdsourcing? A recently published article sheds light on the relationship between culture, creativity and the importance of “cultural alignment” for cross-cultural creative tasks. The paper looks at the effect of culture (the extent to which countries have strong cultural norms and enforce them strictly) on peoples’ likelihood to participate in, and succeed at, global creative tasks. It advances a new theoretical model, the “Cultural Alignment Model of Global Creativity,” to understand how culture impacts creativity in a global context.


36 Reasons Why Top IT Projects Fail.
9 months back, I was part of a discussion started by Ron Sheldrick on LinkedIn about the topic — Failure of top IT projects. To this date the discussion is extremely active with many experts leaving their valuable inputs. Inspired by this discussion, I want to outline some of the top reasons projects fail. But before that, let’s have a quick look at the stats related to the success rate of large projects.


Gartner Launches Integrated GRC Research Program
Our “Hype Cycle for GRC Technologies” and “Market Guide for GRC Software Platforms” will highlight a number of technologies and software vendors that span the wider GRC software market. We will also publish a set of reports (Magic Quadrants, Critical Capabilities and Market Guides) focused specifically on seven market segments within GRC. ... The full set of these “OneGRC” research reports will give our readers the best view of the entire GRC software marketplace as they work towards integrating their GRC software solutions. More information about this “OneGRC” research program will be provided this week at our U.S. Summit as well as at our upcoming Summit events across the globe.


Java Bytecode: Bending the Rules
One of the original intentions of Java bytecode was to reduce a Java program’s size. As an emerging language in the fledgling days of the World Wide Web, applets for example, would require a minimal download time. Thus, sending single bytes as instructions was preferred to transmitting human-readable words and symbols. But despite that translation, a Java program expressed as bytecode still largely resembles the original source code. Over time, developers of languages besides Java created compilers to translate those languages into Java bytecode. Today, the list of language-to-Java-bytecode compilers is almost endless and nearly every programming language became executable on the Java virtual machine.


What’s the scope of a business-model?
The catch is that ‘value’ and ‘money’ are not the same: for example, there’s a very big difference between ‘value for money’ and ‘value is money’. Even at best, money is merely a symbol or indicator of perceived-value. And once we move beyond the most simplistic levels of the business-model, it’s absolutely essential not to treat ‘money’ and ‘value’ as synonyms. Which is a problem here, because that’s exactly what BMCanvas does in its ‘Cost-Structure’ and ‘Revenue-Streams’ cells: it describes costs and returns solely in monetary terms – rather than the value-flow terms that we actually need in order to map out and literally ‘validate’ a complete, implementable, testable business-model. To make it work, we need to go back to that initial definition of ‘business-model’: “A business model describes the rationale of how an organization creates, delivers and captures value“.


Who put the “Enterprise” in Architecture?
A strong contender is Westpac – the Australian bank and financial-services provider. Westpac is one of Australia’s Big Four Banks and also the second-largest bank in New Zealand. In the 1990s it embarked on one of the most ambitious and innovative EA projects. The project – known as Core Systems for the 1990s, or CS90 – included many aspects of EA that we take for granted today: component-based architecture, reference models, generated code, and frameworks. The jury remains divided on whether the project was a “success” or not. The project was a victim of a financial crash, so it was never fully completed. Some believe that what was implemented was radical, effective and way ahead of competing architectures, while some argue that it was costly, career-damaging and incomplete.



Quote for the day:

“A true dreamer is one who knows how to navigate in the dark.” -- John Paul Warren

June 13, 2015

Is customer experience management the new CRM?
Dailes says there are some things companies can do to improve customer experience. “The first thing is to listen to your customers. Understand who your clients are. Understand their needs. You can do this through surveys or by watching users. "Another thing that is really important is to have a policy of constant improvement. Rather than look for major changes, look for slow and constant improvement over time, based on feedback. You are always going to have people who shout quite loudly about what they want, but that’s not always the most useful feedback. Look for feedback that represents the majority of users," she says.


Improving One Process Affected 18 Processes Before it Improved Business
So, every time you are going to look at process improvement, we need to focus on these changes in an incremental manner rather than a big bang approach. Instead of starting with process changes in 12 departments, start with changes in 3 departments and then seven departments and then 12 departments. Every time you are going to initiate process improvement, you must understand the impact on all the departments. Identify which of these are low impact, medium impact, and high impact departments. Secondly, identify the processes in each department. ... So, what are the processes we are talking about? Here we go..”Customer acquisition” and “Customer Relationship” and “Requirement Management”. “Requirement Management” in turn is the link to “Marketing” department as they conduct surveys with existing customers as well as prospects.


Steve Wozniak Says The Internet of Things Is in ‘Bubble Phase’
In the tech world, there’s no concrete definition for a “bubble.” However, one way to gauge bubble-like growth is through irrational industry hype. It’s easy to find bullish forecasts on the IoT market. Cisco believes the number of connected devices worldwide will double from 25 billion in 2015 to 50 billion in 2020. IDC claims the global IoT market will grow from $1.9 trillion in 2013 to $7.1 trillion by 2020. That’s why tech giants such as Google and Apple are pushing into smart homes, connected cars, wearable devices, and mobile payments. Spotting that trend, start-ups are flooding the market with IoT and wearable devices for even the silliest niches. A fart-analyzing wearable, a sex-tracking wearable, and a smart bra that detects binge eating all indicate developers are getting carried away with connecting things to the Internet.


Build your own supercomputer out of Raspberry Pi boards
The RPiCluster provides another option for continuing development of projects that require MPI [Message Passing Interface] or Java in a cluster environment. Second, RPis provide a unique feature in that they have external low-level hardware interfaces for embedded systems use, such as I2C, SPI, UART, and GPIO. This is very useful to electrical engineers requiring testing of embedded hardware on a large scale. Third, having user only access to a cluster is fine if the cluster has all the necessary tools installed. If not however, you must then work with the cluster administrator to get things working. Thus, by building my own cluster I could outfit it with anything I might need directly. Finally, RPis are cheap! The RPi platform has to be one of the cheapest ways to create a cluster of 32 nodes.


Naomi Lefkovitz explains what NIST's privacy risk framework means for agencies
with the Cybersecurity Framework for Improving Critical Infrastructure we were directed to include a methodology for privacy and civil liberties by the executive order. And that methodology was derived from the consensus-based document. And, essentially, at a high level it says, well, 'Consider the privacy implications when you're doing your cybersecurity measures.' That's a very high-level paraphrase, but that's sort of the concept. What we're doing with the risk management framework, which is aimed at federal systems but nonetheless, the concept is, 'OK, how do you consider those privacy implications? How do you go about identifying privacy risk?' Because we're never seen that process laid out.


Keep it simple and risk-based to secure collaboration
Having identified risks, the process of analysing and then treating those risks should be carried out. The key to this process is proportionality.  If the risk treatment becomes too expensive, in terms of time, resources or money, is it worth doing based on the risk? Equally, if the treatment makes doing the job, such as collaborating with a fellow employee, unwieldy and difficult, then the treatment has also failed. It may make the process safer in security terms, but has also made it more difficult and less efficient in achieving operational, business objectives. Security should enable, not inhibit and should always take into consideration the user experience. While risk treatment of a system or process will always be different, there are common themes which form the foundation of a well-managed, and ultimately secure, approach.


Content blocking via geolocation takes world wide out of the web
This is a subject of renewed interest for the European Commission, which formally announced the Digital Single Market initiative last month; the initiative is intended to identify and address issues related to the digital and physical delivery of goods and services across the 28 EU member countries. According to The Guardian, presently only 15% of online shoppers in the EU buy products from another country, while only 7% of small and medium sized businesses sell products across national borders. ... Interestingly, in an effort to limit the need for users to rely on a VPN to access content,Netflix monitors file sharing traffic to identify what films and TV programs are locally popular, and the company acquires the rights for those programs in order to provide a legal (and sanctioned) means to view that content in that country.


Cisco New Intercloud Services Focus on Next Generation Internet of Things Market
Organizations are demanding new ways to manage the exponential growth of data and the ability to obtain real-time analysis. To meet this need, Cisco collaborates with leading Big Data solutions such as MapR, Hortonworks, Cloudera and Apache Hadoop community. Working with these partners, Cisco safely extends Hadoop solutions on-premise to the cloud and provide a true hybrid deployment. It is also providing end customers to maintain the same policies, control and security in their Big Data implementations, as well as greater flexibility and an unlimited virtual scalability.


8 New Big Data Projects To Watch
The big data community has a secret weapon when it comes to innovation: open source. The granddaddy of big data, Apache Hadoop, was born in open source, and its growth will come from continued innovation in done by the community in the open. Here are eight open source projects generating buzz now in the community. ... Zeppelin essentially provides a Web front-end for Spark. The mighty Zep brings a notebook-based approach to giving users data discovery, exploration, and visualization of Spark apps in an interactive manner. The software, which is modeled on the IPython notebook, supports Spark and other frameworks, such as Flink, Tajo, and Ignite.


Cloud tech can make a Supreme Court decision against Obamacare irrelevant
Healthcare.gov is illegal, argue lawyers for Obamacare’s opponents. Their argument against the Affordable Care Act splits hairs about the law’s construction. The underlying legislation designates federal subsidies to be paid through tax credits to the buyers of health insurance purchased on state-operated exchanges. The ACA is silent about the eligibility for subsidies of purchases on the federally operated exchange healthcare.gov. The plaintiffs argue that the subsidies can’t be given to buyers using the federal exchange healthcare.gov, and only can be given to the buyers using the state exchanges such as Cover Oregon.



Quote for the day:

"You must expect great things of yourself before you can do them." -- Michael Jordan

June 12, 2015

Cyber Essentials made mandatory by the Welsh Government
Quoted by SCMagazineUK.com, a Welsh Government spokesperson said: “From 1 April 2015, Cyber Essentials is required for all relevant Welsh Government contracts involving the handling of personal or sensitive information. This will also apply to National Procurement Service collaborative frameworks.” The Welsh Government has identified five levels of risk from 0 to 4. Level 0 is ‘low risk’, and means that no special arrangements are needed when minimal amounts of non-sensitive personal data are processed. ... “The CES defines a set of controls which, when properly implemented, will provide organisations with basic protection from the most prevalent forms of threat coming from the internet. Evidence of holding a Cyber Essentials (or equivalent) certificate is desirable before contract award, but essential at the point when data is to be passed to the supplier.”


3 Accidental Whistleblowers (Fired for Doing their Jobs Well)
As Adam Turteltaub, SCCE VP of Membership Services, puts it: “Whistleblowers are courageous, principled heroes, unless they are on my team, in which case they are dirty rotten traitors.” Whistleblowers are like the foreign body in the organization being attacked by its white blood cells. Or the nail sticking out of the board, begging to be hammered. The modern compliance program has as its stated goal to find, fix and prevent problems. Whistleblowers are a key resource in achieving this goal. But still, the white blood cells remain vigilant. But what happens when the whistleblower is a senior manager, head of a control function or even a CEO, who happens upon the problem – sometimes a very large problem – in the ordinary course of doing their job well?


When Big Hearts Meet Big Data: 6 Nonprofits Using Data to Change the World
When people think of big data, they often think of machines, robots and things that might be generally impersonal. But when you couple data with an altruistic mission, the results can be astounding. As we sink deeper into the digital era, nonprofits are now presented with new opportunities. For example, 56% of people donated to an organization because they read a story via social media. Fundraising sites such as DonorsChoose.org, Causes.com and Network for Good allow organizations to raise money with a simple click of a button. But this is only the beginning. Here we’ll take a look at which organizations have upped the ante by becoming not only socially-driven, but data-driven as well. See how these 6 nonprofits are using data to empower others and make a genuine difference in the world.


Twitter's next CEO faces four challenges
Perhaps the biggest problem Twitter has is that many people who aren't tech enthusiasts still don't understand what it's for or why they should use it. For every occasion Twitter is referred to as a social network, it's also identified as a news source, a publishing system, a feed of real-time events and a micro blog. Perhaps it's all those things, but that doesn't help sell it to people who aren't yet on the service. If it's a social network, why use it when Facebook's around? If it's a micro blog, why not use a proper blog like Tumblr instead? ... The company has tried to address these issues with new tools. Earlier this year, it began rolling out a feature called "instant timeline" that uses a variety of signals, including the contacts on a person's smartphone, to see who they might want to follow and automatically create a list.


Cybersecurity Firm Rapid7 Files For $80 Million IPO
The cybersecurity industry is booming as breaches and nation state attacks continue to dominate headlines. While VC investment in cybersecurity is on the rise, cybersecurity IPOs in the United States have been few and far between. Since November 2009, there have only been 17 IPOs in the security space (seven of which happened in 2012), according to research done by Pitchbook. The most recent security IPO was MobileIron’s $100 million exit almost a full year ago in July 2014. FireEye had biggest security IPO in the past five years at $349 million in September 2013.


Big Data Systems House Sensitive Data, Security Exposures
The result is an exposure that companies may not have counted on as they initiated their pilot big data projects, according to the survey report, "Enabling Big Data By Removing Security and Compliance Barriers," available here (registration required). Cloudera, the supplier of Hadoop system Cloudera Enterprise, sponsored the SANS survey. Many times, those projects demonstrate the utility of bringing together diverse data that was previously hard to assemble given the radically different data types. Big data systems gain utility as more data is brought in. The result is a slow brew of gathering risk without sufficient safeguards, the study warns.


Data as currency: Balancing risk vs. reward
At the heart of good IG is good recordkeeping, and therefore the senior records manager must be a key player in the IG initiative. Also vital to the program are compliance officers to help ensure the recordkeeping practices are satisfying the demands of such laws as Sarbanes-Oxley for the financial industry and the Health Insurance Portability and Accountability Act; IT executives to provide the right tools and to help effect proper protection policies; legal counsel to help assure the defensibility of the program; and senior managers from the business units to provide realistic guidance on how the information is created and used. Organizations wishing to monetize their big data should work to mitigate the security risks by implementing an IG program that treats records as the strategic assets they really are.


Mobility brings new ways to tackle IT security threats
The unique nature of mobile operating systems themselves has also provided new security opportunities. For example, mobile devices have managed to avoid many of the antivirus concerns that threaten Windows PCs, thanks to more closed operating systems such as Apple iOS, said Chris Hazelton, research director for enterprise mobility at 451 Research. OS vendors can still do more to help, including allowing IT to turn off specific app permissions and ensuring third-party apps can't collect employee data, he said. "A developer can sell and monetize your information if they can track your location," he added.


Why Data Lakes Require Semantics
According to Nick Heudecker, research director at Gartner, “Data lakes typically begin as ungoverned data stores. Meeting the needs of wider audiences requires curated repositories with governance, semantic consistency and access controls.” Heudecker also says that “…without at least some semblance of information governance, the lake will end up being a collection of disconnected data pools or information silos all in one place.” ... Adding Semantic technologies can address many of the issues inherent in Data Lakes if an organization needs to rapidly answer complex, real world questions that require the fusion of data in many dimensions. Semantic Data Lake (SDL) is a semantically integrated, self-descriptive data-repository based on graph (network) representation of multi-source, heterogeneous data, including free text narratives.


Q&A with Claudio Perrone on PopcornFlow / Evolve and Disrupt
In lean, we often talk about value streams. Yet, it's not what we do, but rather what we learn by doing it that matters. When I look at a typical scrum or kanban board, however, all I see is a snapshot of the outcome of the thinking behind it. Perhaps we are missing an opportunity. Popcorn flow accelerates, sustains and brings to the surface the reasoning (how and what we learn), specifically through a continuous stream of small and traceable change experiments. This is a vivid example of what I call a "learning stream". Value streams and learning streams work together and help us make progress like rails on a ladder. The trick is to make both visible. Most teams use two separate boards. But some teams who adopted this approach now split their single visual board horizontally.



Quote for the day:

"A man must be big enough to admit his mistakes, smart enough to profit from them, and strong enough to correct them." -- John Maxwell,

June 11, 2015

Q&A: Nina Bjornstad, Country Manager For The UK And Ireland, Google For Work
The core shift has to be us taking those principles of how we interact with our mobile phones on a daily basis and bringing them into the work environment. Introducing a greater sense of play into what we can accomplish, just like we would with an app; or leveraging cloud platform technologies so that we are able to stand a service up, try it out, shut it back down if it's not impacting the business, or grow it further if it is. Businesses need to have their “wow” moment; their ability to have this sense of play and the ability for them to understand what type of consumer-level behaviour is actually possible to bring into the business environment today.


Cloud storage survey highlights security concerns
Cloud storage gateways are replacing and augmenting traditional file servers and tape storage, particularly in remote or branch offices (ROBO). One third of all organisations with more than 50 ROBOs have implemented on-premise cloud storage gateways that support both the private cloud and public cloud, and 27 per cent of all companies have implemented them. Enterprises are coming under pressure to establish contemporary cloud storage solutions that provide the visibility and control required to meet enterprise needs and industry regulations. In the more heavily regulated financial services, government and life sciences industries 42 per cent prefer a completely private cloud that does not rely on external hosted infrastructure, as do 40 per cent of organisations with 10,000 employees or more.


Redefining Loyalty Programs with Big Data and Hadoop
There’s no such thing as too much data when it comes to this sort of analytics work. Every business analyst and data scientist agrees that expanding the data for any given model will typically produce dramatic improvements in analysis. And that data will obviously come in a wide variety of formats—structured, semi-structured, and unstructured, big and small, near and real-time, as well as historical. Try to store it all in a traditional data warehouse, and you may wipe out all of the profits gained from segmentation. You will almost certainly have availability issues, and you will spend a lot of time waiting for IT to massage the data into a form that can be analyzed.


Dutch Cyber Security Council boosts focus on privacy
“The Netherlands aims at being an open, secure and economically promising digital society. A society that is innovative and entrepreneurial, but which is also strong enough to face the risks that go hand-in-hand with our great dependency on IT,” the council says in its 2015 briefing document. “The cyber world is a world full of unknown possibilities and opportunities, but there is also a darker side to it. “Our lives are becoming more comfortable and less tied to times and places, but our privacy is also coming under increasing pressure and cyber crime is on the increase as well. To continue to stimulate our prosperity and economy, cyber security is therefore of crucial importance,” the document says.


Cyber-Espionage Nightmare
It’s not a surprise that such systems are relatively easy to co-opt for nefarious purposes. Ideas for making the Internet more secure have been around for decades, and academic and government labs have churned out interesting proposals. ... “You don’t hear about rebuilding the Internet anymore,” says Greg Shannon, chief scientist at the CERT division of Carnegie Mellon’s Software Engineering Institute. What’s a company to do? Wyatt tightened things at United Steelworkers; among other things, he now gives fewer employees so-called administrative privileges to their computers, and he searches the network for the telltale signs of communications by malware. But none of this would have prevented the intrusions. Wyatt says it “might have slowed them down.”


Under pressure: enterprises want better software, delivered faster and cheaper
Successful applications increasingly require greater technical complexity and sophistication -- 51 percent, for instance, believe that the mobile and web application user experience will become significantly more sophisticated in the next year. Enterprises expect these more sophisticated apps to be created over a shorter timeline without a corresponding increase in developer capacity. For example, 65 percent of companies successfully managing these processes say they need to release new features or bug fixes for their applications at least once a month. Another six percent are even pumping out new releases every other week. The proliferation of different devices also creates development and deployment challenges, the survey finds.


Ciena Builds Advanced Network for NOAA Environmental Research
The new network will enable NOAA to support bandwidth-intensive applications and programs such as the Geostationary Operational Environmental Satellite series R (GOES-R), and the next-generation national weather observation satellite program, which is working to advance weather and climate science and services. NOAA’s mission is to understand and predict changes in climate, weather, oceans and coasts. Its N-Wave science network, initially founded via funding through the American Recovery and Reinvestment Act, is a national spanning network that provides intra-NOAA connectivity, including communication and data transfer (5 Petabytes per month) between NOAA programs, line offices, research facilities and other scientific centers across CONUS, Alaska and Hawaii.


Predicting the next decade of tech
There's another complication in that CIOs increasingly don't control the budget dedicated to innovation, as this is handed onto other business units (such as marketing or digital) that are considered to have a more entrepreneurial outlook. CIOs tend to blame their boss's conservative attitude to risk as the biggest constraint in making riskier IT investments for innovation and growth. Although CIOs claim to be willing to take risks with IT investments, this attitude does not appear to match up with their current project portfolios. Another part of the problem is that it's very hard to measure the return on some of these technologies. Managers have been used to measuring the benefits of new technologies using a standard return-on-investment measure that tracks some very obvious costs -- headcount or spending on new hardware


IT continues to struggle to find software developers, data analysts
Part of the problem may lie with candidates' perceptions of a company's brand, says Tejal Parekh, HackerRank's vice president of marketing. "We work with a lot of customers in areas that aren't typically thought of as technology hotspots. For instance, in the finance sector we have customers facing a dearth of IT talent; they're all innovative companies with a strong technology focus, but candidates don't see them as such. They want to go to Facebook or Amazon," says Parekh. Another challenge lies with the expectations hiring companies have of their candidate pool, says Ravinskar. "There's also an unconscious bias issue with customers who sometimes limit themselves by not looking outside the traditional IT talent pool. They're only considering white, male talent from specific schools or specific geographic areas," says Ravinskar.


Managing Technology with CORE Strategy & Architectural C’s & P’s
What do you do to pursue the opportunities in an organization? In my opinion, these opportunities can be realized by taking four actions –Consolidate, Optimize, Refresh and Enable(CORE) on organization’s technology and system portfolios. These four opportunity vectors form the basis of a handy planning tool, which I call the CORE strategy. Inspired by Kim & Mauborgne [1]’s Four Actions Framework, the idea of CORE came from my experience as IT manager and architect. CORE is all about managing technologies, prioritizing IT spending and allocating resource on the basis of raising or creating capabilities (represented at right-hand side in the diagram), and reducing or eliminating cost & risk



Quote for the day:

"When you innovate, you've got to be prepared for everyone telling you you're nuts." -- Larry Ellison

June 09, 2015

Are you prepared for the future of data centers?
Colocation requires a shift in data center skillsets, Koppy noted, not handing the data center over to a third party. Ask questions -- specifics about the colocation provider's network and power paths and so on -- and if the colocation provider is unwilling to share information your own facilities team would know, consider that a red flag, Courtemanche said. Also, talk to the provider's long-term customers to gauge how your own experience might be. ... There are two problem areas data centers with more than 1,000 servers experience at a much higher rate than smaller ones, according to survey results from IDC: downtime due to human error and security breaches. As one AFCOM Symposium attendee put it, when you outsource, your job goes from managing the data center to managing the colocation provider.


The top 10 myths about agile development
To be flexible has become vital for a business in today’s global markets, and therefore, the ability for IT systems to be equally flexible is essential. The purpose of agile is to allow organisations to react to the increasingly dynamic opportunities and challenges of today’s business world, in which IT has become one of the key enablers. Agile is defined by four values and 12 principles found in the Agile Manifesto. The manifesto provides an umbrella definition, in which there are many other delivery and governance frameworks, such as Scrum or extreme programming, for example.


Is Nepotism Undermining Your Business Technology Innovation?
We no longer do the break-fix relationship. We have a strategy manager that essentially acts as a CIO and manages technology as our clients grow and innovate. You need someone to be there every time you grow and change out a piece of technology and that person needs to have extensive experience throughout your industry with companies of all sizes. A small company that is a family friend doesn’t have that kind of expertise. ... Most “family friend” businesses don’t have this in place and have no idea what sort of support their users are getting, how the response time is or which issues are being resolved and escalated. You don’t have the capital to pay your users to hang out waiting for a call back on an issue.


Erasure Coding For Fun and Profit
Erasure coding essentially uses maths to add a little bit of extra data to the end of the actual data so that if you lose part of this new, bigger amount of data, you can still get all of the original data back. A simple version is a checksum: sum all the ones and zeros and put that at the end. If you lose any one of the bits, you can figure out what it was by re-calculating the checksum and comparing it to the stored checksum. The difference is what the bit was, basically. This is a vast over-simplification, but that’s basically it. ...  There’s a downside (there’s always a downside). If you lose a disk, you have to rebuild all the data from the parity blocks scattered around the place, which reduces the performance of the array because some of the time is spent on the rebuild instead of serving up the data.


Obama vows to boost U.S. cyber defenses amid signs of China hacking
"We have to be as nimble, as aggressive and as well-resourced as those who are trying to break into these systems," Obama told a news conference at the Group of Seven (G7) summit in Germany. U.S. officials, speaking on condition of anonymity, have blamed Chinese hackers for breaching the computers of the Office of Personnel Management and compromising the records of up to four million current and former employees in one of the biggest known attacks on U.S. federal networks. The mission of the intruders, the officials said, appears to have been to steal personal information for recruiting spies and ultimately to seek access to weapons plans and industrial secrets.


Rise of the Surveillance Platform
Hildyard likened a trade-surveillance platform to a buy-and-build hybrid. Such a system requires customization to effectively detect and prevent abuse, as each market ecosystem is unique. But at the same time, building the capability from the ground up is unrealistic. Delivering surveillance via a platform rather than an application gives developers leeway to develop code that’s unique to their organization and the types of behaviors they need to monitor. Sell-side banks “can’t rely on an application to do that,” Hildyard said. “The frequency with which regulatory hot topics emerge is increasing over time,” Hildyard said. Additionally, trade surveillers’ “goal should be to ‘create’ the next big scandal and make sure it doesn’t happen on their watch, in their bank. That requires that they understand behaviors they weren’t previously monitoring for.”


Transforming Text and Data Into a True Knowledge Base
One of the steps in text mining is “relationship identification.” Once entities are identified and enriched, they are connected to other entities; for example, “Foggy Bottom is in Washington, DC”, “Foggy Bottom is near The White House” and “Foggy Bottom is east of Georgetown.” What just happened? We used Open Linked Data (LOD) to verify Foggy Bottom as a neighborhood that exists in Washington DC while also connecting it to other entities. LOD knows that DC is a “District” (not a state) and that it is within the United States. Preexisting facts were combined with results from text analysis to expand the knowledge base.


APIs with Swagger : An Interview with Reverb’s Tony Tam
First, we don’t want to try to stuff every possible feature inside the specification itself. Early on, someone brought up embedding rate-limiting information into the spec. But it would be very difficult to generalize, and would pollute the spec over a feature that possibly many people wouldn’t care about. Next, one thing we learned through the initial versions of Swagger is that it’s easy to write invalid specifications without a simple and robust validator. We chose to use JSON Schema validations, and even built it directly into Swagger-UI. It is an important part of the tooling to help developers write valid Swagger definitions. Removing structural constraints from the spec AND having a robust validation tool would be very difficult.


Case study: What the enterprise can learn from Etsy's DevOps strategy
“You have to be able to demonstrate to the larger business why it’s not just a buzzword and can add value to the business, and the only way to do that is to give them a concrete project and show them how it has positively affected the business,” he says. “The people who make the decisions at the top of the pile may be more business-minded than technically so, and you need to speak their language and demonstrate the impact it has had on key performance indicators or revenue that quarter. “You need to sell the idea to them in business terms because IT and development are service organisations that exist to fulfil the priorities of the business,” Cowie adds.


A Brief History of Big Data Everyone Should Read
Long before computers (as we know them today) were commonplace, the idea that we were creating an ever-expanding body of knowledge ripe for analysis was popular in academia. Although it might be easy to forget, our increasing ability to store and analyze information has been a gradual evolution – although things certainly sped up at the end of the last century, with the invention of digital storage and the internet. With Big Data poised to go mainstream this year, here’s a brief(ish) look at the long history of thought and innovation which have led us to the dawn of the data age.



Quote for the day:

"Every leader needs to look back once in awhile to make sure he has followers." -- Kouzes and Posner