April 25, 2013

Oracle: Renewed Security Focus Will Delay Java 8
In a blog posted Thursday, Mark Reinhold, chief architect of the Java Platform Group, wrote that maintaining Java security "always takes priority over developing new features," which is why some features planned for Java 8 slipped past Milestone 6 (M6) at the end of January, the original feature-complete target.


Six open source security myths debunked - and eight real challenges to consider
Detractors of open source software often point to its broad developer base and open source code as a potential security risk. But that's not a fair assessment, according to Dr Ian Levy, technical director with the CESG ... Open source is no worse or better than proprietary software when it comes to security, according to Levy, who busted myths about open source security — and detailed its genuine security challenges — at the Open Source, Open Standards conference in London last week.


Cisco's new director-class storage switch boosts throughput 6X
The MDS 9710 replaces the Cisco 9500 series as Cisco's top director-class storage switch. The 9500 series offered up to 256Gbps of total throughput, ... The MDS 9710 offers a total of 24 terabits per second of switching capacity for Fibre Channel connectivity and offers Cisco's highest fault-tolerant capabilities with fully redundant (N+1) fans, switching fabrics, and power-supplies or grid redundancy.


Look out, Oracle: SkySQL and MariaDB join forces
On April 23, SkySQL announced that it had signed a merger agreement with Monty Program Ab, MariaDB's parent company. The aim of this new company, which will go under the name SkySQL, is to develop MariaDB into a truly interoperable "NewSQL" open-source database in collaboration with its customers, partners, and the community. The community side will continue as the MariaDB Foundation.


How does advanced malware use the network against you?
"Attackers can change the domain every day, and that's how malware works, and they're able to hide their communication and evade detection by an intrusion prevention system (IPS) or security gateway," Newman said. But by closely watching the communications of all of the devices within a network, Damballa, FireEye, RSA and other vendors are profiling this type of behavior, using a technique often referred to as advanced threat protection.


The CIO 'can't be an order-taker'
The global economy seems to be recovering, albeit slowly, and it therefore follows that the tremendous pressure—financial, technological, existential—on companies' IT organizations will ease. Right? Wrong. Well, maybe. It all depends. Three senior executives—Freddie Mac CIO Robert Lux, Evercore Partners managing director of equity research Kirk Materne, and Blackstone CTO Bill Murphy—gathered here at theBloomberg Enterprise Technology Summit to tease out the real role of the CIO in the modern business, debate best practices for the IT organization and offer solutions for future success.


Hadoop Usage Poised to Explode
The TDWI survey, based on a sample of 263 respondents, suggests that Hadoop adoption could ramp up very quickly: for example, more than one-quarter (28 percent) of respondents expect to be managing production deployments of HDFS in the next 12 months. Others expect their Hadoop deployments to come online more gradually: 24 months (13 percent), 36 months (10 percent), or more than three years (12 percent).


Gauging BYOD acceptance
A whopping 35% of the shops surveyed say consumerization of IT will have a dramatic positive impact on user satisfaction over the next 12-18 months. Another 47% say it will have a moderately positive impact, which, taken together, means more than 80% of the IT folks surveyed see BYOD as a big win. User productivity also scores high, with 76% saying consumerization will have a moderate or dramatic positive impact, while 70% expect the same benefit for business agility, and 69% say consumerization will dramatically or moderately improve process efficiency/collaboration.


Perception is Reality: 8 Steps for Changing How Others See You
The “perception is reality” adage is most often applied to the way each of us sees our own environment. If we see the glass as half full, we will operate from that reality and the glass will always be at least half full. But what if we turn that adage inside out? What if the reality we’re experiencing is due in part to how others perceive us?


Are developers really skilled up for the cloud?
“Developers - when they build an in-house-only solution, in my experience - don’t think a lot about security and the security of that data or that application. That has been the major difference between things we put on-premise only and the things we’re going to put in the cloud,” Hackland said. “The developers are going to have to take into account the integrity and the security of that data. There are probably lots of other [skills issues] but that’s the thing that immediately jumps to mind for me. It’s a different skillset - or a different thinking at least - for the developers as we make that transition,” he said.



Quote for the day:

"Some people change their ways when they see the light; others when they feel the heat" -- Caroline Schoeder

April 24, 2013

The Storage Metrics That Matter
For many, storage is just a bunch of high-capacity hard drives storing all of the organization's data assets, but as the layers are peeled back, it becomes apparent that storage is so much more. Moreover, as organizations experience problems with their storage, nailing down the root cause of the problem can be an exercise in frustration, particularly when it's intermittent. Which metrics really matter when it comes to monitoring storage?


Colorado Startup Making App To Cure Sedentary Habits
The USB rechargeable insole, which can go in any shoe, is equipped with two sensors that can tell if a person is sitting, standing, walking, running, climbing stairs or cycling. Data collected from the insole is transferred to an application on an iPhone that will tell users how much of their day has been spent sitting versus standing, walking or running. The app also will provide calories burned and the number of steps taken.


Mac sales growth stalls -- here's why Apple doesn't care
That jibes with numbers from The NPD Group, which tracks U.S. retail sales, and which last week said Mac sales were flat in the first quarter. Figuring out why Mac sales have gone soft was relatively easy for David Daoud of IDC. In an interview two weeks ago, he dissected what others called a "brutal" quarter for PC shipments. "Apple's facing a very similar environment [to the PC industry in general]," Daoud said then.


Verizon data breach report 2013: Data shows need for risk awareness
Alexander said Verizon's findings highlight how important it is for organizations to conduct a baseline inventory of sensitive data, so it's easier to discover what's missing or what has been tampered with in the wake of a security incident. "I'm a big fan of not only knowing what data you have, but also putting it only on approved sites, because putting security controls on tired systems can be more expensive," Alexander said.


SOLID Agile Development
From reading the Agile lore, you might think that the only answer people give to this is, "Always do TDD and pair programming." But this answer is incomplete. You can do TDD (badly) and pair programming (ineffectively) and not end up in the right place. Alternatively, you can end up in the right place even if you don't do TDD and pair programming, so clearly there's something else that's really the key element.


Mobility Management is BYOD Risk Management
The most-frequently-cited CIO concerns regarding Mobility right now are about BYOD, and are primarily around the costs and risks of technology management - including the very high likelihood of increasing and accelerating technology fragmentation. As we said in a recent Strategic Perspective, “BYOD” is really “BYOT.” And BYOT’s main challenge is the increasing scale and diversity of device numbers, device types, software ecosystems (including OSes, apps, and development stacks), and access points.


ESB Performance Round 6.5
This article presents the latest performance study conducted by the WSO2 ESB team with the latest release of WSO2 ESB (4.6.0). The most significant performance enhancement in this release is making the Passthrough Transport the default transport. In this article the performance of a number of leading open source ESBs are compared and the improvements to the WSO2 ESB are discussed. The results show that the latest WSO2 ESB performs strongly compared to other open source ESBs.


WMI CIM-plified Part 2: PowerShell 3.0
PowerShell 3.0 brings us into the world of CIM which I think you'll find to be a much easier approach for systems management using WMI. On the surface the syntax hasn't really changed much. We have a cmdlet to get instances of a WMI class either by class name or a filter. This is what we used to do:


Enterprises lack confidence in detecting and preventing threats
“Security remains a major concern among organizations. The Ponemon Institute report reveals that even emerging network security technologies are not as effective as they should be. Companies need to review their security investment weighting, to assess whether the areas of greatest risk are receiving adequate attention and how they can address serious security threats,” says Ravi Chauhan, managing directorIndia and SAARC, Juniper Networks


When IT is from Mars, and the business is from Venus
“We have been talking about IT alignment for years but it doesn’t just happen you have to do something. The conversations we have with IT are very technical; business doesn’t understand server uptime so the alignment [needs to be] around communication too,” she said, speaking at CA Technologies’ customer conference in Las Vegas.



Quote for the day:

"Your future is created by what you do today, not tomorrow" -- Robert Kiyosaki

April 23, 2013

A Role for Role-Based Monitoring in the Virtualization, Cloud Space
Virtualization has changed the way in which we must think about security. First, it has merged the traditionally separate roles of networking, storage and server management -- disrupting well-established processes based on separation of duties. Second, it has collapsed configurations of servers, switches, networks and storage into one system, effectively concentrating all of the risk into one platform, creating a system that is "too big to fail."


Network security assessment: Internal testing relies on various tools
While it is important to test the exterior of your network, an attacker may already be inside. The attacker could be a disgruntled employee or an outsider using services located behind-the-firewall and perimeter security defenses. If you are considering testing your internal security controls, there are several things you need to review, among them the types of internal tests, the testing techniques you may want to employ and the importance of testing employees


Conway's Game of Life - A rule framework and implementation
Conway's game of life is however not only fascinating to look at but is of theoretic interest for mathematics physics, philosophy, economy and many other scientific fields. E.g. it is one of the most famous examples of cellular automata which has become a popular topic to study in computability theory. See Wikipedia for a more in depth article about Conway's game of life,


JavaScript Best Practices
As a web developer who has concentrated on back-end coding in C# and front-end look and feel via HTML and CSS, my skills in JavaScript evolved over time instead of by conscious effort. While this is not uncommon, it can allow for some bad habits to be formed. This set of best practices is my way of taking a step back and addressing JavaScript as a first-class language, with both good parts and bad parts.


Security Manager's Journal: A little housecleaning
VPN configuration has always been a point of contention between the security, desktop and network teams. Our current VPN client is deployed in a split tunneling mode. When someone is using the VPN client, only resources on our network are forced to go through the encrypted VPN tunnel. Everything else, such as webmail, social media and personal file storage like Dropbox, is routed through the user's local Internet connection.


Microsoft uses OpenFlow SDN for network monitoring and analysis
The OpenFlow-based tap aggregation system, called Distributed Ethernet Monitoring (DEMON) Appliance, is an alternative to expensive network packet brokers -- the specialized appliances that aggregate network taps and SPAN ports. Microsoft Principal Network Architect Rich Groves presented DEMON at the Open Networking Summit Tuesday.


Making a business case for data storage and backup
Focus the business case on what really adds value. But, when it comes to data, what is valuable? And, just because data is available, does that mean we need it or will use it? I start with two critical, value-based questions: What decisions would you like to make?; and What data do you need in order to make those decisions?


Under New Business Demands, CIOs Can't Cling to Old BI
CIOs must grapple with the fact that the business must be involved in building out IT since he can no longer have tight centralized control of all technology. Organizations have many different applications sprouting up, from visual discovery tools and business analytics that are also becoming part of the growing use of cloud computing.


9 Fallacies of Java Performance
Java performance has the reputation of being something of a Dark Art. Partly this is due to the sophistication of the platform, which makes it hard to reason about in many cases. However, there has historically also been a trend for Java performance techniques to consist of a body of folk wisdom rather than applied statistics and empirical reasoning. In this article, I hope to address some of the most egregious of these technical fairytales.


Anti-virus Software is Dead…Really?
The study leveraged data from over a billion systems worldwide and it turns out that systems that do not have up-to-date AV are 5.5 times more likely to be infected with malware than systems that are protected. It’s also noteworthy that almost 270 million systems worldwide did not have up-to-date AV installed in the second half of 2012; many people that could be benefiting from the protection that AV offers, are not.



Quote for the day:

"The excitement of learning separates youth from old age. As long as you're learning you're not old." -- Rosalyn S. Yalow

April 22, 2013

iOS Safari Browser Has A Massive Caching Issue!
In the past to ensure my jQuery AJAX requests were not cached, the “cache: false” option within the AJAX call normally sufficed. Not if you’re making POST web service requests. It’s only until recently I found using “cache:false” option will not have an affect on POST requests, as stated on jQuery API: “Pages fetched with POST are never cached, so the cache and ifModified options in jQuery.ajaxSetup() have no effect on these requests.” ... Read on for a work around for this issue.


The Seven Information Smells of Domain Modelling
We discuss signals in your domain model that tell you there are more questions to ask. We call these signals “information smells”, and they tell us we may not have a complete understanding of the information our domain cares about. The smell could mean that we are missing information from our domain model or that we included incorrect information on the domain model.


BPM is just a subset of EA
EA is really the over acrhing framework for organizations, and if so surely BPM (as we originally conceived back in 1992) is simply a sub set of EA? So what you may ask? Well the whole world of BPM needs to get with EA, or do we need to redefine BPM completely? -- Join this discussion on Linkedin.


Dell Boomi unveils AtomSphere Summer 12
"And the security enhancements also give IT teams further assurance that their data and IP is secure, whether moving through cloud or on-premise applications," Nucci said. The new cloud integration platform comes with a crowd sourced regression testing feature called Boomi Assure to ensure that customer integration processes are tested each time Boomi is updated.


Do your due diligence before taking the leap
On the upside, the cloud gives you the flexibility of being able to take your business with you while on the go. But there are always security concerns when you store important data on the web. King offers the following pointers to consider when deciding whether cloud-computing technology is right your practice:


Review: Best tablets for business
That's a mere drop in the tablet Tsunami. On the back of a stunning 78.4 per cent year-over-year growth in tablet shipments at the close of 2012, IDC expects tablets to surpass desktop PCs in 2013, and laptops in 2014. Don't want to miss the tablet wave? Here's a rundown of four tablets which mean business.


IT Challenges and Opportunities in 2013
At a recent ISACA conference, we asked attendees about the key business/tech issues, challenges and opportunities facing them in 2013. Take a look at what the conference attendees consider as the challenges and opportunities for the year 2013.


Master Data and Integration – Data, Function, and Process
Your organization’s use of master data has to be rationalized along the different dimensions of utilization, no matter what domains are referenced and no matter the original context. A more mature approach to master data design looks at consistency and accuracy in shared data creation and use across multiple sources, for multiple domains, used by all applications, and synchronized across (and even external to) the enterprise.


10 Rules For Working With Big Data
Many organizations will need to formulate big data projects in the near future, if not already. Reflecting the all-encompassing, 360 degree perspective that a successful big data analytics campaign should take, organizations must resolve the issues and address the challenges of implementing big data in professional environments, and use it to increase revenue potential -- a result of new marketing insight and analytic enhancement.


Deep thinking on complex systems: A devops reading list
The shift in focus — from risk avoidance to anti-fragility, from a focus on stability to a focus on resilience, and from a focus on large-grained contextual systems to small-grained composable alternatives — will and is opening a whole new world of agility, experimentation and execution for enterprise IT. It’s a critical subject for every IT practitioner to understand.



Quote for the day:

"The indispensable first step to getting the things you want out of life is this: decide what you want. " -- Ben Stein

April 21, 2013

What Happens When Startup Founders Disagree?
One of the top reasons startups fail is conflicts between founders. In the beginning of your startup, disagreements between founders are likely to arise. In fact, I’d be worried if you never argued. The question is: how do you deal with conflict resolution? Can you channel it positively to fuel your startup’s growth? Stella Fayman has found it beneficial to develop a framework around conflict resolution.


Open Source is Taking Over the Software World
"Increasingly, enterprises see [open source software] as leading innovation, delivering higher quality, and driving growth rather than being just a free or low-cost alternative," Skok noted. "Going forward, we can expect more disruption from open source, new business models, and many more exciting new projects and companies."


Welcome to Berkeley: Where Hadoop isn’t nearly fast enough
AMPLab’s most well-known product in the big data space, called Spark, is an in-memory parallel processing framework that’s comparable to Hadoop MapReduce except, its creators claim, it is up to 100 times faster. Because it runs in-memory, Spark might be comparable with something like Druid or SAP’s HANA system, too. Spark is the processing engine that powersClearStory’s next-generation analytics and visualization service.


Windows Blue Wish List: 15 Must-See Improvements
An early leak of Windows Blue revealed several much-needed enhancements, including beefed-up syncing options, deeper Start screen personalization, and some simple yet effective interface tweaks. Still, that's just scratching the tip of the iceberg. Above and beyond the tweaks already found in the leak, here's our wish list of 15 potential Windows Blue improvements that could help make Windows 8 twice as nice as it is now.


Apple keeps patching Java on OS X Snow Leopard after proposed drop-dead date
Apple could do so for months to come. Even after Oracle halts support for Java 6, it will still distribute patches to enterprises that have negotiated contract support plans. Apple will probably have access to those only-for-corporate-customers patches and will use them to draft updates for its own users. The last public patches for Java 5, for example, shipped in November 2009, but Apple continued to issue Java 5 updates for OS X Leopard until June 2011, or 20 months later.


Wireless sensor networking technology is taking off
Arundeep Kakkar, a wireless technology expert, says that hard to service areas have found respite through the adoption of wireless sensor technology. “Wireless sensor technology revolves around the concept of remote sensing: sensing the data, transferring the data to an intended site, and processing the data meant to serve the relevant application,” he says.


Larry Page: Android powers Google Glass, obviously
"Obviously Glass runs on Android," Page said toward the end of the conference call reporting Google's strong first-quarter financial results. It's not a surprise, given how the engineering resources Google already has poured into Android. But the company hadn't confirmed it, even when it detailed Google Glass specifications last week.


As the PC market turns, touchscreens start to take over
Samsung's Chromebook has been at the top of Amazon's list of bestselling notebooks for several months. But a closer look at the rest of that list reveals some interesting facts about an industry in transition. Most notably, touchscreens are finally starting to take off.


Enterprises are moving to the "suite" life
Moving to a suite can mean asking end users to part with their preferred devices, applications or services-and therein lies the CIO’s challenge. To succeed, CIOs must demonstrate that a broad-based enterprise solution can meet most, if not all, end-user needs. The CIO must help users and decision makers understand the real goal of IT, which isn’t to give every user a specific product to solve a specific problem but to ensure that the entire organization is lean, efficient, productive, secure, and compliant.


Ember.js - Web Applications Done Right
The first thing we need to define in our application is the routes that our application will be built up with. You can think of a route as a state that the user can be in . Each route will have its own clearly defined URL. Ember.js will generate controllers, view and template automatically for you, which is convenient. Whenever you find yourself needing more than the basic pre-defined functionality you simply create you own implementation and Ember.js will automatically substitute your code in place of the generated code.



Quote for the day:

"Make the present good, and the past will take care of itself." -- Knute Rockne