January 15, 2016

Digital Influencer: Catching Up With David Linthicum, Sage Of The Cloud

It’s unusual for techies with no particular writing background to have the discipline to write such a book. Linthicum’s secret? “You have to give up stuff. Spend less time on things you enjoy,” he says. “It’s tough to get the discipline to write one to two thousand words per day, but you have to do so to crank out a book.” In spite of putting in such an effort, the book proved too early to market – another repeating theme in Linthicum’s background. “I wrote the EAI book for Addison Wesley,” Linthicum explains, “But only a few people were following EAI at the time. In 1996 there was no interest in the book.” Then in 1997, Software AG spun off their American efforts as SAGA Software, and Linthicum joined as CTO. “They had no technology at the time, so we had to create our own,” Linthicum says. “By 1997 EAI was still not hot, so we called it ‘solution-oriented middleware’.”


IT efficiency is a moving target; here's how to hit the bull's-eye

IT staying behind closed doors or locked in the data center is no longer an option. Technology continues to integrate deeply into every business and job function of the organization. All leaders, including the chief information officer and directors, should attend and be involved with activities on campus. How can IT develop an internal strategic plan if we are not fully engaged with business units, academics, faculty senate, staff senate and student government? Without that engagement we are only focusing on what we think is best or listing the next evolution of our favorite technologies. It is easy to like a particular technology and be biased toward the true impact it will have at an institution.


What Remix OS means for Android on PCs

What Remix means for Android is unclear. While Chrome OS has taken over the education market, it hasn't seen the same level of success that Android has in mobile. In particular, the selection of Chrome apps is pretty paltry, while development of Android apps is thriving. If Android were Google's laptop-and-desktop operating system, the app gap would cease to be an issue. But Google's ultimate plans don't really matter. Android's fundamental open-source nature means it can be hacked and modified into a desktop operating system even if Google never wants to go in that direction. The Remix OS proves that. Even if Android does become more of a desktop operating system, Google probably won't start offering it for download onto any PC. With some work and polish, Jide's Remix OS could become a more compelling alternative for average computer users than traditional desktop Linux. This is a project to keep an eye on.


Why the lack of women in IT is bad for tech, bad for the economy

According to the report the problem starts at school. It points to a 2012 survey which found that only 17 percent of girls had been taught any computer coding in school, while almost twice as many boys had (33 percent). "And some argue that girls are often steered away from science and math courses in primary school," the report says. "Other experts go earlier still, stressing the role parents need to take in encouraging girls younger than school age to be interested in science and technology." According to Regina Moran, the CEO of Fujitsu UK & Ireland, the gender imbalance is bad news for the UK. "Women make up a large proportion of our customers both professionally and personally," she said. "Neglecting women in the workforce will be a costly mistake."


When To Upgrade PCs: 4 Tips For A Smart IT Strategy

It's equally important to monitor user behavior, to see if their PC usage is changing over time. Smartphone and tablet use through progressive BYOD policies within many organizations are pushing users away from the PC and onto mobile devices. Additionally, applications themselves are being reworked so that they can operate on lower-performance mobile devices. In many cases, the only option for PC users is to access applications using a Web front-end that requires very few computing resources. The corporate-issued PC is becoming nothing more than a simple keyboard, mouse, and monitor portal, which connects to backend servers that handle the bulk of the processing power. That's why we see companies waiting for a catalyst event -- such as a major OS upgrade -- in order to justify new hardware.


Smartwatches in transition as smartglasses rule

In 2015, industry analysts expected smartglasses to realize $1 billion in annual costs savings in the field services industry, and they estimate the market will grow to $6 billion in 2016, Ballard said. "I think monocular smartglasses are going to really fly this year in enterprise. I think you're going to see true augmented reality glasses like Microsoft HoloLens and cousins like Epson's glasses bridging gap between the two," Ballard said. "We are seeing some early adoption trends that we think will take off around HoloLens, biometric authentication, token, and wearable IoT sensors." AR glasses are particularly beneficial in the enterprise. Dan Ledger, principal for Endeavour Partners, said, "We're getting to a point now where Google Glass came out a few years ago and ran its course and Google is working on its new iteration of that and Microsoft has some incredible products.


Why thinking like a criminal is good for security

A combined focus on technical and human surveillance is good security practice. “Have employees be aware. Lock doors and windows. There are a lot of technology things you can do. Bad guys have as good of technology as the good guys. We scan and find, but bad guys do too, but they act before the hole is fixed,” Stolte said.  A slight shift in language when talking about security and data can also help security teams think like a criminal. Erlin said, “It’s a very common best practice for organizations to identify sensitive data. Using the term valuable instead twists perception away from what organizations feel is sensitive to what might be valuable to a criminal.” Regardless of what other information criminals might find valuable, the crown jewels will always remain sensitive and top priority.


Data virtualization tools move into strategic IT realm

Well, like a lot of things in analytics, things have been around for a long time but the business need for them and the ability of the environment that we're in -- in terms of the amount of memory people have, network bandwidth -- [wasn't conducive to effective use of its capabilities]. The technology … has existed for a while but the business demand (social media, IoT, sensor devices, machine learning, Web data and a lot of the cloud data) [did not]. A lot of companies use cloud applications … so there's much more demand for this virtualization of the data and there's much more data that's scattered out there. Even though the technology existed before, the need for it has exploded and then the capabilities for that kind of technology to go after the volumes of data -- the unstructured data and structured data -- have all sort of grown based on the demand.


2016: Cyber-Crime Becomes Big-Time

"2016 will see cybercrime finally find its place in our official statistics," says KPMG's cyber security technical director, David Ferbrache, "extortion attacks have been making a comeback with criminals demanding significant sums for suspending denial of service attacks against targets; not going public with stolen data; and of course providing a ‘service’ which grants access to a ‘client’s data which they had previously hacked and encrypted." “While phishing attacks, banking Trojans and large scale low value cash outs have characterised the last 10 years of cybercrime, new techniques are becoming part of the criminal arsenal while firms invest more and more in cyber threat intelligence in the hope of keeping up," adds Ferbrache, "in 2016 we predict that organised crime groups will become increasingly selective in targeting high net worth individuals, corporate treasuries and commercial bank accounts."


State CIOs agenda targets cybersecurity

"Our CIOs have to manage a lot of federal data, and they all have to be managed differently, even though the CIO is attempting ... to establish an enterprise vision," she says. "These federal regulations are standing in the way of consolidation and optimization, to put it simply." So NASCIO is asking for relief from federal regulations, generally (a tall order, Cooke admits), and in particular is trying to call attention to the challenge of sharing information, both within different state agencies and with outside entities like federal and local government groups, other states and the private sector. Too often, Cooke says, federal programs administered by the states don't afford CIOs or agency administrators the explicit flexibility to share information and collaborate across the siloes in which those programs reside.



Quote for the day:


"The worst part of success is trying to find someone who is happy for you." -- Bette Midler,


January 14, 2016

Big Data Goes Mainstream: What Now?

Organizations today are often pursuing those goals by implementing big data environments that coexist with the data warehouse, according to Bean. Organizations are currently looking at what information is better suited to what environment. "There are certain things that a data warehouse is suited for, like data compliance" or operational reporting. "Big data is more about discovery environments and looking for patterns … Right now there is a value to both environments." Another factor that comes into play between the data warehouse environment and the big data initiatives is cost. "One of the original premises of big data was it was much more cost-effective than traditional data environments," Bean said. "And that will likely be the case."


Microsoft R Server Is Free for Developers and Students

A Developer Edition of Microsoft R Server, "with all the features of the commercial version," will be available to coders as a free download. It will also be included in the Microsoft Data Science Virtual Machine, a Windows Server 2012-based virtual machine that includes tools for data scientists and developers. Microsoft is also making Microsoft R Server available free for students under the company's DreamSpark technology in education program. "Providing even more students with access to Microsoft R Server is a pretty big deal," wrote Microsoft Program Manager Joseph Rickert. "Microsoft R Server extends the reach of R into big data, distributed processing environments by providing a framework for manipulating large data sets time so that all of the data being analyzed does not have to simultaneously fit into memory."


Big Data Still Requires Humans To Make Meaningful Connections

Perhaps it’s because we put so much faith into technology to solve our problems. We have been led to believe big data is going to help businesses make smarter and more informed decisions. In healthcare, it will help our doctors and medical professionals make better diagnoses and find the most appropriate treatments. In sports, it will help our favorite teams pick the best players. In government, it will open up information and lead us to the transparency promised land where no corrupt government official can hide. And it will help root out those people who are planning to do us harm. As we learned in the recent horrific attacks in Paris, sometimes it doesn’t matter how much information we collect.


Truly Wireless Headphones Arrive, But With a Few Strings Attached

It works for keeping the ears in sync. The Dash, sold online and coming soon to shops, kept going even when I wore it in the shower. Bragi says even when you are swimming, the waterproof earbuds work, playing music stored directly on them. The audio, again, sounded fine for working out, although even a bit more compressed than the Earin buds. Bragi says it will continue to fine-tune audio quality. The Dash can last more than three hours on a single charge, which it also gets from a companion battery case. Each Dash bud is roughly double the size of the Earin, but still lays flat inside my ear. (Silicone sleeves of multiple sizes help fit different-size ears.) I almost never felt like the Dash would fall out, whether I was running or doing my best impression of Animal from the Muppets.


Hope in a Glove for Parkinson’s Patients

GyroGlove’s design is simple. It uses a miniature, dynamically adjustable gyroscope, which sits on the back of the hand, within a plastic casing attached to the glove’s material. When the device is switched on, the battery-powered gyroscope whirs to life. Its orientation is adjusted by a precession hinge and turntable, both controlled by a small circuit board, thereby pushing back against the wearer’s movements as the gyroscope tries to right itself. While the initial prototypes of the device still require refinements to size and noise, Alison McGregor, professor of musculoskeletal biodynamics at Imperial College, who has been a mentor to the team, says the device “holds great promise and could have a significant impact on users’ quality of life.”


Emerging: DataOps and three tips for getting there

CIOs know the typical wave of adoption -- technology or otherwise -- starts with early adopters. But even before the early adopters, CIOs will need to find their innovators -- employees who are, essentially, change agents. "In order to build a culture, we needed to identify not only the people who have technical skills or the business skills, but those who also are fearless. They want to go out to an organization and actually change things -- they want to change the way government works," she said. ... Before Jin arrived, a basic dashboard was designed for Mayor Martin Walsh,the first of its kind for the city. A year later, the mayor's dashboard has not only become more a sophisticated administration window into Boston doings, it also acts as a constituent-facing information portal.


How CIOs will refine digital transformation in 2016

“The traditional IT security defense is completely broken,” says Russell. “Most CIOs and senior leadership and boards are realizing that when you wake up every day and see another breach of some kind … the existing model does not work.” He’s well into a four-year IT security roadmap, which includes adding vArmour software to identify and flag anomalous traffic flowing across the company’s computer network. It’s designed to find the type of threat that hit Target, in which an intruder crawled into the network through a third-party vendor and began moving data. “That’s a huge transition from saying ‘we have a barrier nobody can get through.’” The tech has also provides fodder for conversation with his board, which wants details on what he is doing to buttress corporate defense.


People are the biggest source of vulnerability

People are the biggest point of vulnerability in any organization and the endpoint is where they interact with whatever an attacker is after: intellectual property, credentials, cyber ransom, etc. Further, people are responsible for the policies and procedures that are in place at the enterprise, whether forced upon them by regulatory bodies or voluntarily for proper security hygiene. Securing the endpoint would be less difficult if we were willing to accept policies and procedures that could help reduce the attack surface. But, no enterprise, in practice, wants to put employees through having separate systems for outside/inside network access. Employees want to and will use their corporate equipment for personal things: checking email, syncing music with their phones, and engaging others on social networks.


Automakers tap mobile software experts in search of premium cache

"Younger customers demand the latest connectivity features, and German premium automakers need to develop new offerings in the digital arena which cater to this," said Thilo Koslowski, vice president of the automotive practice at technology market research firm Gartner. BMW's Chicago team helped to develop 'Bumper Detect' a new system unveiled last week which uses BMW's onboard camera and sensors to photograph potential thieves or vandals. "The car can take photographs of another vehicle which may have left a dent in your parked car, and send pictures to your mobile device," Robertson said. The Bavarian automaker already has several software development centres in Munich and elsewhere and said it will continue to recruit staff in 2016 to help "the advancement of new technologies, including the ever-increasing scale of digitalization."


3 Lessons From The Graveyard of Fintech Start-Ups

Every tech field involves legal complexities. While big corporations have their own lawyers to maneuver complicated legal regulations, start-ups are on their own. And it’s a big deal. While some financial technologies may be far less intrusive, some could face intense quagmires. GoCardless, a UK-based online direct debit provider, has been sponsored by RBS (Royal Bank of Scotland) and handles $1 billion of transactions a year. Even their founder, Hiroki Takeuchi, has noted the difficulty in understanding regulations, as well as penetrating the bank-owned financial infrastructure. “To get access, you need to set up some sort of arrangement with a bank that moves at a glacial pace.” They didn’t go it alone, and it took a lot of work to work with the famed glacial pace of traditional banks.



Quote for the day:


"Respect for people is the cornerstone of communication and networking." -- @susanroane


January 13, 2016

Board Governance: Higher Expectations, but Better Practices?

Although Banks have made significant progress toward meeting regulatory expectations in this area, necessary changes have not yet been implemented at several institutions. For example, 30% of Banks have not formalized in their board charters a requirement for the risk committee to approve the Bank’s risk governance framework, as required under EPS. A similar 30% are yet to require their board (or the risk committee) to perform an annual self-assessment, as expected by the OCC. Finally, about 20% of Banks have not yet formalized the requirement that their board (or the risk committee) annually approve the institution’s risk appetite statement (a key component of the risk governance framework), as required by the OCC.


Data Privacy Reform Is Wreaking Havoc

From a legislative viewpoint, the matter of “where data resides” is critical as these new data privacy rules roll out. The Ovum research underscores that when it comes to the physical location of data, there is uncertainty and confusion. Until now, a key benefit of the cloud was that businesses no longer needed to concern themselves with the physical location of their data. It was stored off-site, for all to share, as needed. Now, with the European Union (EU), Israel and the United States beefing up regulations with the goal of stopping the flood of data leaks and stolen information, businesses must shift their approach to the cloud in a fundamental way. Suddenly, the location controlling the physical path of data matters.


4 Ways To Be A More Resilient Leader

Why resiliency? Last year I wrote about employer brand and candidate experience. Subsequent conversations with friends, family and clients made me realize organizations, and employees, and people, need more than a strong brand and the intent to engage and create a positive experience for employees and potential talent. We need resilient organizations with flexible, resourceful leaders to create the most productive work culture for people. Most organizations make a plan and figure that will get them where they need to go. But much of the time things don’t go according to plan, and people lose heart and focus. Employees start asking the same questions every day, betraying their unease and uncertainty.


Learn any of these 16 programming languages and you'll always have a job

"Software is eating the world," venture capitalist Marc Andreessen famously declared. Someone has to write that software. Why not you? There are thousands of programming languages, but some are far more popular than others. When a company goes out to find new programming talent, they're looking for people familiar with the languages and systems they already use - even as new languages like Apple Swift start to make a splash. Here are the programming languages you should learn if you always want to have a job, as suggested by the popular TIOBE Index.


The best web browser to replace obsolete Internet Explorer is...

The easiest way to get a new, supported browser is to simply upgrade to IE 11. You can do that in two ways: Download the installer from Microsoft--be wary of getting it from third-party websites---and simply install it. Or, you can simply update your system. Either way works perfectly well whether you're moving from IE 8, 9 or 10 to 11. ... Chrome, 501, barely edged out Opera, 500 for the top spot. Firefox took third with 448. And, once more eating the dust of the others, came IE with 336. The numbers make it obvious. When you replace IE 8, 9 or 10 on Windows 7, Chrome is easily the best choice. Opera, which has become the forgotten browser, also deserves some attention. Firefox, which has had more than its fair share of troubles, doesn't appear to be a good choice.


The Internet of Things is wasted without risk-taking

Productive data analysis requires an open mind. While it is undoubtedly important to improve business efficiency and utilise data for maximising profitability, the greatest innovations are typically born out of business opportunities created in completely new markets or sectors. The most lucrative jackpots are ideas that cannot be foreseen before data analysis. Let us discuss a few examples. Elevator companies provide services to large masses of people on a daily basis, which means they possess a large amount of data on the movements of their users. This data could be utilised in planning parking facilities, developing restaurant services or ensuring security. Another example could be a crane company with a hundred active cranes operating in the middle of a large city. 


2015 was a tipping point for six technologies

Smartphones with the capabilities of today’s iPhone will cost less than $50 by 2020. By then, the efforts of Facebook, Google, OneWeb, and SpaceX to blanket the Earth with inexpensive Web access through drones, balloons, and microsatellites will surely bear fruit. This means we will see another 3 billion people come on line. This will be particularly transformative for the developing world. Soon, everyone will have access to the ocean of knowledge on the Internet. They’ll be able to learn about scientific advances as they happen. Social media will enable billions of people to share their experiences and help one another. Farmers will be able learn how to improve crop yields. And those are but a few examples.


Global telecommunications: 2016 outlook

Wireless spectrum is essential to all wireless networks for over-the-air transmission of analog and digital signals including voice, video and data. The value of spectrum in the FCC’s latest auction rose significantly above prior auctions and the secondary market, underscoring the need for more of this resource. ... Revenue growth for Europe’s telecom industry in 2016 will depend largely on the ability to stimulate and monetize demand for data amid a tepid economic recovery in Europe and regulatory uncertainty. Fixed-mobile convergence will set the tone of competition with varying levels of promotional activity across countries. Potential consolidation in Italy and the U.K., even with stricter remedy requirements, support pricing power. Capital spending will moderate as 4G networks near completion.


For the First Time, More Are Mobile-Banking Than Going to a Branch

For the first time ever, there are more of you than people who actually walked into a branch in 2015, according to a new survey by Javelin Strategy & Research, a unit of financial-industry research firm Greenwich Associates. Last year, roughly 30% of adults in the U.S. used a mobile banking service weekly, while just 24% availed themselves of a physical branch service as often, Javelin’s survey of 3,100 people found. That’s the first time in the history of the survey that mobile users (and that means just smartphones and tablets, not via desktop computers) outpaced branch users, Javelin said. In 2015, one in ten consumers used mobile banking for the first time, or roughly 25 million people. Since 2010 the number of smartphone bankers has doubled, while the number of people using a tablet has jumped nearly 10 times, Javelin found.



Quote for the day:


"Progress is impossible without change and those who cannot change their minds cannot change anything." -- George B. Shaw


January 12, 2016

List of data breaches and cyber attacks in 2015 – over 480 million leaked records

There have been breaches of highly sensitive data (including that of children), targeted attacks on government agencies such as the US’s OPM and Germany’s Bundestag, and an alarming number of well-orchestrated DDoS attacks. Money has been stolen, data has been swiped and lives have been ruined. However, I must not fail to mention the fantastic work law enforcement agencies around the world have been putting in to bring justice down on the cyber criminals causing havoc this year. As Stuart Winter-Tear recently called it, 2015 has been the year of collaboration, and we can only hope to see the same in 2016.


Malware on the Smart TV?

So in this case, it’s not a new type of malware specifically targeting Smart TVs, but a common threat to all internet users. There are also reports that this scam has hit users on Apple MacBooks; and since it runs in the browser, it can run on Smart TVs and even on smartphones. These kinds of threats often get combined with exploits and may take advantage of vulnerabilities in the browser, Flash Player or Java. If successful, they may install additional malware on the machine or change DNS settings of your system or home router which may lead to similar symptoms. Such behaviour could not be observed in this case, since they malicious pages have been removed already. Keep in mind, there might be vulnerabilities in the software on your TV! Therefore it’s important to check if your device is up to date. Make sure you installed the latest updates for your Smart TV!


Red Hat's Ansible 2.0 brings new power to devops

Blocks also provide a way to perform exception handling, so that if something goes wrong during the course of a block, it can be handled. Existing scrips that don't use blocks will run as-is, but legacy scripts could only implement the same kind of functionality by way of a lot of boilerplate code. A new addition called strategies controls how playbooks execute, with the default for existing scripts being a "linear" strategy -- e.g., all hosts have to finish one task before any of them can begin the next one. A "serial" strategy, meanwhile, ensures one group of hosts finishes its work before another group can begin, and another strategy named "free" allows all hosts to run independently of each other. Strategies are not hard-wired into Ansible, either; they can be defined by plug-ins.


Will LiFi Take Big Data And The Internet Of Things To A New Level?

LiFi is a category of Visible Light Communication; an LED light flickers at speeds undetectable to the naked eye to transmit data — a bit like high tech morse code. In fact, scientists have demonstrated in a lab that they can transmit information at as much as 224 gigabits per second, the equivalent of 18 movies of 1.5 GB each being downloaded every single second. In an office setting, they were able to achieve speeds up to 100 times faster than average WiFi speeds. The LED lights require so little energy, they can be powered by a standard ethernet cord. Inventor Harald Haas has also suggested that the smart lights could be powered by solar cells charging batteries. In addition, LiFi does not create electromagnetic interference the way WiFi does, meaning it could have important applications in sensitive locations like healthcare facilities.


8 Things I Learned About SDx in 2015

This is, of course, the concept known as virtualization, whereby applications are detached or disaggregated from the underlying hardware. The most important aspect of this is on the development level, because it has ushered in the era of agile development in which software can be designed, deployed, moved, and updated on the fly. ... Bubbles have value in themselves even though there is going to be pain and carnage along the way. Even as a herd of startups is culled, the bubble can accelerate innovation in specific markets. What’s interesting about the orginal Internet bubble, which resulted in a crash and many failed companies, is that it created the largest economic engine in the world — and some of the world’s most valuable companies, including Amazon and Google. The same thing is happening in SDx and cloud-based security.


Tech innovations that will transform healthcare in the next five years

Healthcare providers are no strangers to the impact of technology on their operations. Over the past several years, for example, the move to electronic health records, though painful, has helped organizations develop the IT capabilities to pursue other innovations, with an eye toward better outcomes and improved operational efficiency. While many technology advancements hold tremendous potential to transform the industry, their timing and viability are unclear, particularly since promising technologies must often go through years of testing to obtain approval for use. Industry regulations, such as safeguarding patient information, can further cloud the timeline.


NAS vs object: Which one for large volumes of unstructured data?

Object storage enables enterprises and service providers to manage multi-petabyte secondary storage with relative ease. This does not directly compete with traditional file and block storage for serving frequently-accessed data and transactional workloads. In addition, when we refer to storage performance we usually think in terms of speed, latency and throughput in the datacentre. This is very different to the cloudy world of distributed applications and clients, where mobile devices typically access data over long distances and from widely disparate locations. The second differentiator is geographic scale. In the distributed world we need distributed storage performance and throughput.


Exposing the Lucene Library as a Microservice with Baratine

The ability to expose an existing application or library as a web service without any code modifications is a most appealing concept. Using Baratine, an open-source framework for building a platform of loosely coupled microservices, this can be accomplished in two steps: Implement a service portion (SOA) then; and Implement a client library for communication. Using this approach, Baratine can transform an existing library or application into a standalone web service. The Baratine services will communicate with the existing library, and the Baratine clients will service requests from the outside world. ... The Apache Foundation describes Lucene as: “a high-performance, full-featured text search engine library written entirely in Java. It is a technology suitable for nearly any application that requires full-text search, especially cross-platform.”


Scale-Out Storage and the Virtualized Data Center

Scale-out, as opposed to scale up, has the promise of allowing a solution to grow with the number of hosts in the cluster, but very often we see solutions that fail to live up to this promise. Why is scale-out hard? Well, there are multiple reasons why scale-out is hard and although the specifics of each solution are different, the common theme is that multiple hosts means multiple copies of data, and multiple copies means they need to be kept coherent or consistent. The price of keeping the copies coherent, henceforth referred to as doing “cache coherency”, goes up as you traverse down the following list: A. Immutable objects B. Mutable objects. Single Reader, Single Writer (Single-RW) C. Mutable objects. Multiple Readers, Multiple Writers (Multi-RW)



Quote for the day:



"The secret to success is doing the stuff other people won't do & doing it for a really long time." -- John Jantsch


January 11, 2016

Redmonk analysts on best navigating the tricky path to DevOps adoption

It's the idea that Hilton International or Marriott would be worrying about Airbnb. They weren’t thinking like that. Or transport companies around the world asking what the impact of Uber is.  We've all heard that software is eating the world, but what that basically says is that the threats are real. We used to be in an environment where, if you were a bank, you just looked at your four peer banks and thought that as long as they don’t have too much of an advantage, we're okay. Now they're saying that we're a bank and we're competing with Google and Facebook. Actually, the tolerance for stability is a little bit lower than it was. I had a very interesting conversation with a retailer recently. They had talked about the different goals that organizations have.


A disaster recovery/business continuity plan for the data breach age

The need to manage and protect both business and personal data (as clearly differentiated from the software) has never been more important. A disaster recovery/business continuity plan that does not account for our dependence on data puts the enterprise, its employees and customers at risk. ...
A good disaster recovery/business continuity (DR/BC) plan is not an IT plan, it is a business plan that has significant IT components. As discussed above, more and more focus needs to be placed upon datarecovery beyond ensuring that programs and processes are returned to operational status. The plan should be scenario-based and aligned to the likelihood of varying levels and types of risks as specified by documented business impact analyses and business risk assessments.


Why customer is not always right

There are two fatal flaws in this model, both having to do with managing expectations. First, clients need to understand that they are unlikely to get every deliverable without some compromise – particularly in custom software, where nobody knows exactly what’s involved until the project is more than half done. Second, the project lead on the consultant side must actively manage expectations during every client meeting. If the project lead on the client side is weak – technically or politically – s/he will not successfully propagate the realities of prioritization and negotiation to executives in the client organization. This means the project is in trouble before it starts … and, worse, the trouble can be totally invisible to the client until it’s way too late.


How tech giants spread open source programming love

Programming languages and technologies that were developed by industry and Internet giants – specifically to meet the unique challenges they faced operating at massive scale – have been open sourced and are now being adopted by regular-sized enterprises for everyday use. Part of the reason for this is a natural technology trickle-down effect, according to Mark Driver, a research director at Gartner. "Today's leading edge super high tech is tomorrow’s standard product," he says. "Also, large companies (like Google and Facebook) understand the collaborative nature of open computing and the dynamics that drive the Internet. So it's natural that they share these technologies and strengthen the industry around them."


Six Transformations From 2015 That Will Reshape The World

Looking at the list of finalists for the Crunchies, you could get the impression that the greatest advances of 2015 were sharing and delivery apps, software platforms, and pencils. Yes, these are cool. But much bigger things happened last year. A broad range of technologies reached a tipping point, from science projects or objects of convenience for the rich, to inventions that will transform humanity. We haven’t seen anything of this magnitude since the invention of the printing press in the 1400s. And this is just the beginning. Starting in 2016, a wider range of technologies will begin to reach their tipping points. Here are the six amazing transformations we just saw.


Britain is on the verge of an IT crisis

This shortage will boil over in the coming years as a generation of IT workers, who built the systems and databases that still power critical functions, begin to retire. This is especially worrying in finance, where large institutions, which have repeatedly merged and sold off parts of their businesses, have back-end systems that have been hastily thrown together. As those that created them leave the workforce, disasters will be more difficult and take longer to recover from. Companies have responded to the problems with hiring IT workers by outsourcing more work. But having done this, says Tate, many have made poor decisions, found contractors to be inadequate, and moved operations back inside. The alternative is simply to pay more for the best talent, but a swell in demand across the board is making this increasingly expensive.


3 Guiding Principles for Innovation in Managed Services

We simplify what has become complicated, we create dashboards of the automation and single pane of glass displays of the coordinators, and we start the cycle over again. It sure seems a little reversed to me. Am I issuing a wake-up call to our industry? Absolutely! I have begun to initiate some brain-storming sessions with colleagues that challenge the status quo. Our technology is now using Fully Automated Storage Tiering, multiple alerting consolidation engines, automatic load balancing, pooled resource rebalancing, and the list goes on and on. This is fantastic and exciting beyond belief to talk about, explore, and work with these technologies. However, I am involved in services. We are the pilots of the automation, and we must aviate, navigate and communicate our way through the technology hierarchy.


The Dark Side of The Wearables

As wearable devices make their way into the workplace and corporate networks, they bring a host of security and privacy challenges for IT departments and increase the amount of data that data brokers have to sell about an individual. Jeff Jenkins, chief operating officer and co-founder of APX Labs, talked about the security and privacy of wearables during a panel interview with Tech Pro Research at CES 2015. Because wearable devices are designed to be small and portable, Jenkins said, "you have to make sure you're thinking security first and you're thinking about the information that's being generated by them. You have situations where it's no longer just personal data that may be exposed or compromised, but also potentially operational data, that could be sensitive in nature."


The Emerging Data Design: Bitemporal Data

Simply defined, bitemporal data means storing current and historical data, corrected and adjusted data, all together in the same place. Bitemporal means you are using two time dimensions simultaneously – one to represent business versions and one for corrections. For example, let’s say you have a database table of customers; in a bitemporal world, you would store changes (versions) of the customer’s data, over time, as well as any corrections, as new rows in the same table. Customer data changes include attributes like the customer’s name, address or buying preferences. Corrections (some people like to call it adjustments) represent restatements of data that people or systems make to record the right value. Human typing errors or software errors create data that may get corrected.


DDoS: 4 Attack Trends to Watch in 2016

Most businesses are ill-prepared for DDoS attacks, which is why it costs them so much to recover, Meyerrose says. The cost of recovering from a DDoS attack can be more than $50,000 for small businesses, he notes, quoting data from security firm Kaspersky Labs. That cost includes business lost to downtime and technology expenses and investments associated with site recovery. So what can be done to defend against the growing DDoS threat? "My main strategy for defense would be making sure I could quickly detect and block all types of DDoS attacks, e.g. application or network layer, and be able to quickly redirect my users to a backup duplicate, albeit streamlined, site to keep my business running without interruption," Litan says.



Quote for the day:


"Once we rid ourselves of traditional thinking we can get on with creating the future." -- James Bertrand


January 10, 2016

Open Source as a Driver of Internet of Things

The zero entry barrier provided by the use of open source, with several toolkits, libraries, and open source hardware like Arduino and Raspberry Pi, is the foundation for it turning up in small devices sprinkled all over the globe, from home security to energy management systems, from automobile telematics to health monitors. Because open source helps lower the cost of the device itself, companies can now experiment and stitch together solutions that would otherwise have been ignored because they would have required upfront purchasing of expensive licenses for development tools and environments, specific libraries and software components. Open source is a very effective way to ride the IoT wave at high speed while keeping the risks and costs to do so under control.


Cisco's global cloud projections may blow your mind

Annual global cloud IP traffic is expected to reach 8.6 ZB by the end of 2019, up from 2.1 ZB per year in 2014. In an interesting glimpse into how new technologies are helping drive efficiencies in spite of this massive increase in traffic, networking technologies such as SDN and NFV are expected to streamline data center traffic flows such that the traffic volumes reaching the highest tier (core) of the data center may fall below 10.4 ZB per year, and lower data center tiers could carry over 40 ZB of traffic per year. In terms of how this traffic looks on a regional basis, perhaps unsurprisingly North America will have the highest cloud traffic volume (3.6 ZB) by 2019, followed by Asia Pacific (2.3 ZB) and Western Europe (1.5 ZB). North America will also have the highest data center traffic volume (4.5 ZB) by 2019, followed by Asia Pacific (2.7 ZB) and Western Europe (1.8 ZB).


What makes a great company? Let’s talk information flow

The flow of information between employees is important across all levels and titles. Too often, executive teams hold intelligence close to their chest in fear of having competitive knowledge or financial earnings exposed outside of the company. We want to lead by example — and transparency and trust are huge components. With that goal in mind, we host a Datameer Radio session each month so everyone can get an update on the company and participate in a candid Q&A with the executive team. We’ve found that not only do our employees respect the confidentiality of the information that is shared, but also knowing what is going on strengthens their commitment to being a part of helping us grow. It’s clear that the workplace is in need of disruption with new models of motivation to drive inspiration and enhance well-being.


Internet Of Things Extends Business' Ability To Sense And Respond

Call it fallout from the Google effect, he explains. “One of the things that Google and search has done for us is it has infinitely expanded the capacity of the human memory,” says Hoover. “I don’t have to memorize all the facts in the world. I can go out and look them up and find it if I want to learn about reinforcement learning. It’s expanded my brain, my memory to nearly infinite capacity.” By analogy, the billions of sensors across the planet is expanding our awareness of our surrounding. The Internet of Things is “about Googling reality,” Hoover explains. “I see things, I hear things, I sense the world around me. To sense something at the time it occurs, it no longer has to be near my body. I want to understand the state of pollution in Beijing; I go and find it on the internet.


Dutch government says no to 'encryption backdoors'

The Netherlands began reviewing its policies after the recent Paris terrorist attacks. But this week it said "restrictive" measures would put citizens at risk. Encryption is a way of protecting communications or data so that it is incomprehensible without the correct passcode or key. Advocates say it protects users by preventing criminals and spies from prying into private conversations. But security agencies have said they struggled to bypass encrypted messaging platforms used by groups such as so-called Islamic State to plan attacks. "We are not some kind of maniacs who are ideologues against encryption," FBI director James Comey said in November: "But we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, how to resolve it."


Big Data Security and Compliance Issues in the Cloud

It’s a quandary. Businesses want to be able to conduct deep, flexible analytics on complete data sets. That’s the essence of big data. You don’t want to omit any data that might contribute to finding business-facing insights. You want the cloud for flexibility and economics. But, you also don’t want to run afoul of compliance regimens or increase your exposure to security risks. What can you do? Don’t worry. As I said, it can be worked out. Getting on top of public cloud big data security and compliance challenges takes effort on two fronts. First, there has to be a coherent, disciplined set of data governance policies at work in the cloud. Platforms also matter. The two work together, with the platform enabling the definition and enforcement of governance policies.


Symantec Adds Deep Learning to Anti-Malware Tools to Detect Zero-Days

Until recently, deep learning has been locked away in the software development labs. A few companies have realized that they can spot malware by its components and its behavior to ferret out most zero-day attacks before they have a chance to cause damage. Because of this, deep learning is now being deployed on the cyber-security battleground. ... Symantec has their sights set on bigger goals in the enterprise. The next target will be enterprise email, especially cloud-based email. "We process a lot of the world's email," Gardner said. "A lot of attacks enter the enterprise through email. They're insidious." He said that by attacking company email systems, cyber-criminals are able to seize critical information and, in addition, able to steal a lot of money through phishing schemes that install malware on company networks.


The DIFA Framework for evaluating data science projects

A situation that many CIOs or data science departments will face today is that the list of possible analytics projects is sheer endless. The range of project candidates usually begins with analyzing customers and ends somewhere at utilizing social media data. Needless to say that not all project candidates will make sense from a business and especially ROI perspective. Also, some projects will run into dead ends because some fundamental bits turn out to be missing. Even though experimentation and some vagueness about eventual monetary success in the context of data science projects is normal, there are some hard facts that heavily influence the success of a data science project. These facts are structured in the DIFA framework which is explained below.


Tracking Cloud Services: An Essential Security Step

Not knowing who's responsible within an enterprise for managing cloud serviceclouds contracts could result in the inventorying of cloud services falling through the cracks. "The decentralized procurement model of cloud creates situations where individuals and business units may use a cloud service outside of the purview of the central IT organization," says Jim Reavis, CEO of the Cloud Security Alliance, a not-for-profit that promotes use of cloud security best practices. Confusion about who is responsible for cloud services contracts within the enterprise could lead to the failure to inventory each agreement. "Organizations fail to inventory their cloud services and other cloud-accessible devices because they fail to appreciate that cloud computing is not a technology decision," says Kevin Jackson, founder of the cloud computing consultancy GovCloud Network.


How Digital Disruptors use Data Science

Digital disruptors are fast and relentless. They are constantly releasing new functionality. They try things - they experiment. In order to do this, digital disruptors need a feedback loop. They use the data from their customers’ use of their product to get fast and accurate feedback on how these products are being used. Lets look at examples of how they do this using data science. On race days, Nascar analyses all the tweets and fan site activity relating to the race. It uses data science to bucket this human interaction data into topics, and for each topic it automatically determines sentiment. It then addresses any concerns thru information on its fan site, information at the event, or feeds to it broadcast partner, Fox Broadcasting.



Quote for the day:



Technological change is not additive; it's ecological. A new technology does not merely add something; it changes everything. -- Neil Postman


January 09, 2016

Antivirus software could make your company more vulnerable

Antivirus vendors don't seem too concerned about the potential for widespread attacks against their consumer products. For the most part, researchers agree that such attacks are unlikely for now because typical cybercriminal gangs have other, more popular, targets to attack such as Flash Player, Java, Silverlight, Internet Explorer or Microsoft Office. However, the creators of those widely used applications have increasingly added exploit mitigations to them in recent years, and as more people update to newer and better protected versions attackers might be forced to find new targets. Therefore, future attacks against antivirus products used by tens of millions or hundreds of millions of consumers can't be ruled out, especially if cybercriminals get their hands on previously unknown -- zero-day -- vulnerabilities, as they have done from time to time.


XL Catlin Analytics Strategy: Quality Over Quantity

Getting internally and externally sourced data ready for modeling is the bulk of the work, she explains. “Coming up with a cohesive data set probably takes four times longer than creating the model,” she says. “I would say we spend 45 percent of our time on the data, 10 percent on the model, and 45 percent on change management.” The data is housed in SAS and SQL databases , linked through ODBC connections. The team writes code in the SAS programming language to run the data analysis, relying on a code library. SQL and R are also used, to a lesser extent; SQL to extract data from source systems, and R, a language and environment for statistical computing and graphics for exploratory data analysis.


The transition from cloud back to a data center migration

Groupon began its move out of the cloud in 2011, three years after the online deal website was launched. "The biggest driver was cost," Chatha said. "It was not economically feasible for us to stay in the cloud." A motivating factor for some companies to move to the cloud is the ability to pay for it as an operating expense, rather than a capital expense. Today, base rent and utilities payments for colocation space can be treated as Opex, and hardware can be financed and paid as Opex, too, he said. Groupon's needs are more diverse than Netflix, for example, which has generated headlines about its complete move to Amazon Web Services (AWS). Netflix has its greatest need for storage, Chatha said, while Groupon needs everything, from virtual machine hosts to databases.


One-on-One Coaching Misses the Mark

Traditional coaching works with ane executive one-on-one and helps him find new approaches. Believing this approach too limited, we facilitated a meeting with the executive and his team to share the feedback we gathered. This eliminated secrecy and impressed the team. The executive had made himself vulnerable, and the team began thinking about how they could help him. Then we moved the conversation away from the executive to how the team could improve. It began discussing how better to define its collective goals, redesign meetings to make them more productive, and address issues before they became problems. The challenges the team identified, and the solutions proffered to improve performance, never would have emerged in private, one-on-one coaching sessions.


DDoS attack on BBC may have been biggest in history

A group calling itself New World Hacking said that the attack reached 602Gbps. If accurate, that would put it at almost twice the size of the previous record of 334Gbps, recorded by Arbor Networks last year. "Some of this information still needs to be confirmed," said Paul Nicholson, director of product marketing at A10 Networks, a security vendor that helps protect companies against DDoS attacks. "If it's proven, it would be the largest attack on record. But it depends on whether it's actually confirmed, because it's still a relatively recent attack."


Banks, don’t wait for your competition to become data driven

First, the upside of leveraging the potential of data science and analytics and developing data driven business models is not only a measure to increase internal process efficiency but especially to attract customers and maintain a sustainable business. Second, the risk of a “sit tight and wait” strategy is truly suicidal. Establishing a data driven business culture cannot be done over night and needs time for people training and development, letting aside the effort and time needed to choose and set up the systems and infrastructure. Recall how Google disrupted the search industry. Yahoo, Lycos and all these almost forgotten dinosaurs could never catch up over come even close to Google’s success after they had been disrupted.


The Dying Technologies Of 2016

Thinking of antique technologies, vinyl has made a comeback but CDs, DVDs, and Blu-Ray? They’re all marching to the media graveyard. Today, we stream everything we can. I still buy and own CD and DVD players, but I’m an old guy. Also, call me a Luddite, but I like having my music, videos and books in my hand, not in some distant cloud. There aren’t many of us left. Fewer and fewer PCs and laptops come with a CD/DVD player. We used to use CD/DVD drives to install software too. I rarely do that anymore. That’s not just because we download almost all our software today. It’s also because stand-alone PC software is on its way out. Accounting, office suites, customer-relationship management — you name it, we do it on the cloud now.


Project Alignment, Hiring Shortfall Top 2016 Big Data Challenges

This isn’t a new problem. Looking back even a few years ago, when it became clear that data was essentially currency, people predicted significant shortfalls in data scientists. In 2015, companies throughout the industry felt the sting acutely. Every day, new job postings go up looking for qualified data scientists. It takes time to find candidates and not every data genius is the perfect fit for every company. There may be some relief coming, with specialty certificate and alternative education programs for big data popping up from universities and other educational institutions, but it’s not an immediate fix for 2016. If companies want to fill their teams with more data scientists, my advice is to hire people in accordance to the nature of the problems companies want to solve, not all problems require advance data science.


Why your cyber insurance investment may not pay off

If you are considering cyber insurance, you are in my opinion doing the right thing. The cost of a data breach can be staggering, and many small and medium companies suffering one will not even survive. That being said, the purchase of a policy without establishing and following appropriate information security policies and procedures may well be a waste of money. Attorney Eran Kahana, a guest on episode 172 of the Down the Security Hole podcast, put is quite simply: "If you don't do security well, the courts will kill you." Since a strong security posture is necessary anyway to protect your business, the ability to meet the requirements for cyber insurance is just a bonus.  The following are some of the general thing you will need to have in place prior to seeking insurance.


The Search For The Killer Bot

As 2016 dawns, there’s a sense in Silicon Valley that the decades-old fantasy of a true digital assistant is due to roar back into the mainstream. If the trend in past years has been assistants powered by voice — Siri, Alexa, Cortana — in 2016 the focus is shifting to text. And if the bots come, as industry insiders are betting they will, there will be casualties: with artificial intelligence doing the searching for us, Google may see fewer queries. Our AI-powered assistants will manage more and more of our digital activities, eventually diminishing the importance of individual, siloed apps, and the app stores that sell them. Many websites could come to feel as outdated as GeoCities pages — and some companies might ditch them entirely.



Quote for the day:


"Deal with the world the way it is, not the way you wish it was." -- John Chambers


January 07, 2016

Connecting Big Data Project Management with Enterprise Data Strategy

Ideally a portfolio of projects will support an organization’s strategic plan and the goals or missions the organization is charged with pursuing. We may also need to “get tactical” by delivering value to the customer or client as quickly as possible, perhaps by focusing on better-controlled and better-understood product centric data early on via a “data lake” approach. Doing so will be good for the customer and will help create a relationship of trust moving forward. Such a relationship will be needed when complications or uncertainties arise and need to be dealt with. In organizations that are not historically “data centric” or in organizations where management and staff have a low level of data literacy, an early demonstration of value from data analysis is especially important. 


Hybrid Cloud, Microservices and The API Economy: Looking To 2016

The drive toward cloud and the drive toward hybrid environments. If you look back, containers are not surprising because the need for portability became very critical. We ended up with a truly hybrid environment. Along with that, you see this movement towards an API Economy, a movement towards microservices, the movement of DevOps, of rapid transmission, of rapid delivery of small batches of changes–all those made containers very attractive. To me, not only is this something we’ll look back on and say 2015 is where the traction began, but it’s going to gain even more traction and transformation in 2016.


Evaluating your need for a data warehouse platform

A data warehouse platform is typically based on a relational DBMS, and the data in it is structured and generally originates from an organization's operational and transactional systems. Data warehouses are accessed by business executives and analysts using BI dashboards, OLAP and reporting tools, and ad hoc SQL queries. Big data analytics, on the other hand, is typically supported by nonrelational technologies such as Hadoop, Spark and NoSQL DBMSes. The data can be both structured and unstructured, and can originate from every type of internal system plus external data sources, such as social media. Analytics are performed on big data for discovery and insight


Best practices in HDFS authorization with Apache Ranger

Apache Ranger offers a federated authorization model for HDFS. Ranger plugin for HDFS checks for Ranger policies and if a policy exists, access is granted to user. If a policy doesn’t exist in Ranger, then Ranger would default to native permissions model in HDFS (POSIX or HDFS ACL). This federated model is applicable for HDFS and Yarn service in Ranger. ... The federated authorization model enables customers to safely implement Ranger in an existing cluster without affecting jobs which rely on POSIX permissions. We recommend to enable this option as the default model for all deployments. Ranger’s user interface makes it easy for administrators to find the permission (Ranger policy or native HDFS)that provides access to the user.


Why the Cloud Is Taking Over Traditional IT Systems

Data is flowing over the unsecured public data highway, so security is critical, particularly as more workers switch to remote and mobile work. Infrastructure and applications are exposed to the outside world. At this point in the cloud evolution, most new cloud 2.0 applications are architected specifically for the cloud. This means that the performance and response time is higher than the first generation of cloud applications, which were just old client/server applications retrofitted with web interfaces. Around 2013, Moore’s Law started to run into the constraints of the laws of physics. Approaching very small size, transistors are less reliable. Consumers of computing power have enjoyed riding the wave of inexpensive computing power in increasingly smaller devices.


Data Center Design: Which Standards to Follow?

Best practices mean different things to different people and organizations. This series of articles will focus on the major best practices applicable across all types of data centers, including enterprise, colocation, and internet facilities. We will review codes, design standards, and operational standards. We will discuss best practices with respect to facility conceptual design, space planning, building construction, and physical security, as well as mechanical, electrical, plumbing, and fire protection. Facility operations, maintenance, and procedures will be the final topics for the series. Following appropriate codes and standards would seem to be an obvious direction when designing new or upgrading an existing data center.


Design Thinking Is Taking Hold At IBM

IBM's adoption of Design Thinking is important for the company's sheer market heft, but there is another reason, said Coleman. "IBM exists in the gap between the reality of a situation ('We've always succeeded this way.') and what could be," he said. "Design Thinkers say, 'Sure, that's great, but I have a vision," Coleman said. "Most people fear [a vision] because there's risk involved." He said that if Design Thinking succeeds at IBM, a company that for decades has typified how big business in the US works, large numbers of companies will likely follow suit. Indeed, IBM's Cutler said the company gives tours of its studio in Austin three times a week. Pushback still happens among employees and customers, of course. "Anytime something smells like a new process," Cutler admitted, some people are going to get defensive.


The 10 biggest startup opportunities in 2016

This year, venture capitalists and industry observers say the tech world should expect more of the same. "Most hot startups in 2016 won't be trying to lead revolutions or usher in whole new industries," says Igor Shoifot, an investment partner with TMT Investments. "Instead, they'll be enhancing existing technologies, products, services, or transactional ecosystems by saving users time, money, effort, and helping them make better choices more easily." However, the New Year has a few potential technology surprises in store, including the "Uberization" of manufacturing and mobile ecommerce in emerging markets. Here are 10 of the hottest technology startup categories, trends and opportunities (ranked in no particular order) experts expect to see in 2016.


How Goldman Sachs and Bank of America use the cloud and containers

For Thomas, containers represent a way to get the company’s developers and infrastructure workers to focus on the highest-value work. Too much time is spent on managing middleware systems and messaging buses that don’t add value for the bank. “Simplifying that and really flipping ratios of people who are just maintaining, supporting, managing applications, to people who are pushing the applications forward and bringing more value for our customers is the foundation of the goal,” he says. “It’s not about cost reduction, it’s about reinvesting the people and the talent we have to really business value added things for our customers.” Simplification means consolidation too. Thomas says Bank of America has condensed from 64 data centers last year to 31 this year. It plans to have only eight data centers by the end of 2016.


Governance Challenges When Gatekeepers are “Chilled”

The primary board concern is that for certain potentially controversial initiatives, some gatekeepers may become “gun-shy;” i.e., may engage in self-protective conduct that frustrates valid board strategic initiatives and other appropriate efforts. This, despite the fiduciary or employment risks a gatekeeper may assume by acting in what may be perceived as his/her own interests, as opposed to the legitimate business interests of the company. Note that this is a concern separate and distinct from the concern, expressed by some knowledgeable observers, that the new DOJ policy will have a chilling effect on employees’ willingness to cooperate in their companies’ internal investigations. We’re talking here about a different kind of “chill.” Such self-protective conduct may manifest itself in both obvious and subtle ways



Quote for the day:



"The sharpest criticism often goes hand in hand with the deepest idealism and love of country." -- Robert F. Kennedy


January 06, 2016

5 Predictions for Trends in Data, Analytics and Machine Learning in 2016

Applications will be designed to discover self improvement strategies as a new breed of log and machine data analytics, at the cloud layer, using predictive algorithms, enables; continuous improvement, continuous integration and continuous deployment. The application will learn from its users, in this sense the users will become the system architects teaching the system what they, the users, want and how the system is to deliver it to them. Gartner view Advanced Machine Learning amongst the top trends to emerge in 2016 with “advanced machine learning where deep neural nets move beyond classic computing ad information management to create systems that can autonomously learn to perceive the world, on their own … this is what makes smart machines appear "intelligent."


CES 2016: Sneak Peek At Emerging Trends

CES 2016 in Las Vegas came to life for media attendees with a preview event -- CES Unveiled -- on Monday night. The event was set up for vendors to show off their products in hopes of attaining media attention. It also served as a glimpse of the broader products and trends we'll be talking about throughout 2016 and beyond. After walking around a crowded ballroom for a couple of hours checking out gadgets of all shapes, sizes, and functionality, here are the major trends I saw observed that I think are likely to have long-term impact on our lives and businesses.


EU privacy watchdog to set up ethics advisory group

Outlining his plans for an ethics advisory group, Buttarelli said the group will “advise on a new digital ethics that allows the EU to realise the benefits of technology for society, whether for security or economic reasons, in ways that reinforce the rights and freedoms of individuals while retaining the value of human dignity”.  Buttarelli said that as the understanding that dignity is important spreads, people will want more opportunities to protect their privacy. “But we also need to be clear about exchanging personal data for incentives, whether those incentives relate to increased security or consumer benefits,” he said. According to Buttarelli, the internet has evolved such that the tracking of people’s behaviour has become routine for many intelligence agencies and an essential revenue stream for some of the most successful companies.


How IBM's Watson Takes On The World

Cognitive computing, according to Vice President of IBM Watson Steve Gold, essentially marks the arrival of a new “era” in computing. What started with his own company’s development of tabulation computing, to process US census data at the dawn of the 20thcentury, developed into programmatic computing in the middle of the century, with the arrival of transistors, relational databases, magnetic storage and eventually microprocessors. Now, the enormous growth in unstructured data we have experienced in recent years, and the sophisticated methods that have been developed to help us make sense of, understand and learn from this data, has given rise to cognitive computing. Cognitive computers don’t need to be programmed – they can learn for themselves.


Manage Your Emotional Culture

This playful spirit at the top permeates Vail. Management tactics, special outings, celebrations, and rewards all support the emotional culture. Resort managers consistently model joy and prescribe it for their teams. During the workday they give out pins when they notice employees spontaneously having fun or helping others enjoy their jobs. Rather than asking people to follow standardized customer service scripts, they tell everyone to “go out there and have fun.” Mark Gasta, the company’s chief people officer, says he regularly sees ski-lift operators dancing, making jokes, doing “whatever it takes to have fun and entertain the guest” while ensuring a safe experience on the slopes.


Data centers seek creative skills to drive innovation in IT

Creativity and innovation have more to do with the hierarchical, logical IT world than people may think, said James Stanger, senior director of products for CompTIA Inc., a nonprofit IT industry association involved in training and certifications. Innovation and creativity enhances an IT pro's ability to troubleshoot, design architectures and optimize performance to meet traditionally important metrics, such asreliability, stability and efficiency of IT operations. Stanger calls it the ability to make an informed choice. Combine an ability to see "the spaces between the systems" -- how everything interconnects and works in your environment -- with a deep knowledge of the protocols and procedures in use, and the IT worker can create the best architecture and operations possible for their business, he said.


Apple’s convergence will be about input not interface

It’s not the interface that’s changed, it’s the input. A Surface-style touch keyboard was a given as soon as the iPad Pro was confirmed, but Apple did more than move the keys to a more comfortable position. Snapping a Smart Keyboard to the iPad Pro instantly creates a bridge between the desktop and mobile realms, not just with the quick keystrokes and onscreen shortcut bar, but also in how integral it is to the whole experience. With the Air and the mini, Bluetooth keyboards are highly optional and occasional accessories that add little more than convenient typing, but the Smart Keyboard is absolutely necessary to the iPad Pro, so much so that I’m surprised Apple didn’t charge $200 extra and just include it in the box. It may be a baby step, but it’s an important one in the evolution of iOS.


“Just 14% said the IT operations department was the main sponsor of the migration project, and 11% said a business leader with no knowledge of the cloud was the main instigator,” said Rackspace’sAnatomy of a Cloud Migration report. “Overall, this means that CEOs, business leaders and boards of directors drive six out of 10 (61%) cloud migrations,” it added. In cases where the move to cloud was being led by a business leader rather than a tech one, it is far more common to see companies employ a third-party organisation to oversee the process, the report said. As for the reason why business leaders, rather than IT decision-makers, are leading organisations’ cloud charge, it could be because adopting cloud is seen as a way of cutting costs from the business.


Microsoft's New Security Approach

Nadella emphasized that the tools to protect, detect and respond to threats have existed for many years. The seeds for this were planted more than a year ago as Microsoft combined Intune, Azure Rights Management and Azure Active Directory Premium into its Enterprise Mobility Suite and the company doubled down on technologies such as auth­entication and identity management. "What is new is that posture," Nadella said. .... What Microsoft is trying to build, he said, is an "intelligent security graph" that brings together virtually all of the company's security intelligence from streams throughout Microsoft, its customers, partners and security operations centers throughout the world in real time and that of select partners tied into that graph.


Are Data Scientists Doing the Job They Were Hired For?

In a perfect world, data scientists would be free to access and manipulate all enterprise content quickly and fluidly without impairment. But the reality of the data environment for most businesses is a scattered and messy ecosystem of multiple systems and software; each used for different content and management functions. Data is duplicated, disconnected, and disjointed. There is no single portal or platform for search. When data scientists are forced to gather content from IT systems that are sprawled across innumerous platforms and departments, they are left grasping at straws and with little more than a flawed convenience sample. Garbage in, garbage out. The data scientist won’t likely answer all of our problems, but data management just might – if given enough time and planning. As 2016 starts to dawn upon us, business leadership is starting to realize that analytics skills alone will do little to make sense of enterprise-scale content.



Quote for the day:


"Executive ability is deciding quickly and getting somebody else to do the work." -- John G. Pollard