May 26, 2013

Android Studio: An IDE built for Android
Android Studio uses a new build system based on Gradle that provides flexibility, customized build flavors, dependency resolution, and much more. This new build system allows you to build your projects in the IDE as well as on your continuous integrations servers. The combination lets you easily manage complex build configurations natively, throughout your workflow, across all of your tools. Check out the preview documentation to get a better idea of what the new build system can do
.

What Are The Drawbacks Of REST?
Ganesh wrote a response, which he repeated in his blog: I wouldn't say REST has "drawbacks" as such. It does what it says on the tin, and does that very well. But remember that the only implementation of the REST architecture uses the HTTP protocol. We can surely think of a future RESTian implementation that uses another transport protocol, and that is where some improvements could be made. He then goes on to talk about four areas for possible improvement and it is worth noting that as with many people, Ganesh equates REST to REST/HTTP, i.e., REST over HTTP:


No niche for iPad: A cautionary tale on 'needing a purpose'
Don't discount the PC yet. Latest market figures suggest that there is a massive consumer decline in PC shipments. But enterprise and business figures are still widely unknown. Anecdotal reports suggest that PCs are still core to desk-work productivity, which makes sense as tablets can suit one industry and not another. Also, people love using tablets for sitting on the sofa and winding down.


Jim Goodnight on SAS in-memory analytics and the data scientist
In the 12-minute podcast, listeners will: Hear Goodnight's take on the potential benefits of SAS in-memory analytics and other in-memory tools; Get advice on the responsibilities that data scientists can take on in organizations; and Find out how SAS judges which new technologies deserve the most attention.


Logitech Alert review: video surveillance over power lines
Quality video over internal power is surprisingly solid, regardless of whether or not appliances like dishwashers or clothes dryers are running. ... That's not to say there aren't some issues. There are, but nothing that can't be mended in subsequent software updates. The core of the system just simply works — and that's a darned rare thing to say about any networking product, let alone one that mixes video, power distribution, and the Internet.


Newbie leadership mistakes and the important lessons learned
Here are eight important lessons learnt by newbie leaders around which are provided by the Young Entrepreneur Council, an invite-only organization composed of the world’s most promising young entrepreneurs.


5 Kinds of Business Analysis Techniques Every Executive Should Know
If you’re a business user thinking about analytics, the options can be dizzying. Where do you begin? Here is a list of 5 business analysis techniques to get you started. ... Once you have these 5 business analysis techniques in your toolbox, you’ll be able to cover a lot of analytical ground—and have the information you need to make more informed decisions as a result.


Leadership: A Thriving or Surviving State of Mind?
Many would say they understand the fundamental difference between thriving, and surviving. Most leaders would easily choose thriving over surviving at any given moment in time. Then, why is it that I see so much hype around teaching business leaders and others how to “survive”? How can any justice come from teaching businesses to perspire as a reaction to the economy and endorse protectionism and stagnation as a tool for growth?


7 Big Data Trends That Will Impact Your Business
We are reaching an inflection point in the market where the level of hype and frequent confusion about “Big Data” will soon be replaced by customer success stories. Already we’re seeing such stories emerge as businesses willingly share their triumphs. As with any paradigm shift in computing where a particular topic draws great attention from the press, investors and innovators, this shift is supported by strong business value proof points.


Internet History: Blast From The Past
Do you know what the biggest websites on the web looked like when they started? Internet has evolved a lot since its early days, and with the technical improvements of both screen resolution and connection speed, so did web design. Websites are more graphically-rich, but that’s not the only point of evolution. More and more effort is put into providing internet users with nice browsing experiences.



Quote for the day:

"If you make friends with yourself you will never be alone." -- Maxwell Maltz

May 25, 2013

Facebook engineers reveal how Parse fits into Platform, B2B strategies
The last pillar, Application Services, is where Parse comes in. Ilya Sukhar, co-founder and former CEO of Parse, acknowledged that developing for mobile is "really hard" given the sheer amount of devices, mobile operating systems, apps, use cases, and everything else possibly related to the form factor. Prior to the acquisition, Sukhar explained that his startup's biggest competition came from companies choosing to build apps in-house.


Hands-on with Mercedes-Benz's new Google integration
Mercedes-Benz was on the scene at this week's Google I/O conference showcasing its new Google services integration in a new SL convertible. The entire onscreen interface is rendered on an Apple iPhone running Mercedes-Benz's DriveStyle app. The phone is connected to the infotainment system via a Mercedes-Benz Drive Kit Plus HDMI connection and is controlled via the Comand control knob on the center console.


Wearable Tech Market May Grow to US 30-50 Billion Size by 2018: Credit Suisse Report
Parts of the Credit Suisse report that found their way into the blog of the business magazine Barron’s, said smartphones and smartwatches were one of the key driving forces behind the expected growth in wearable tech, and could act as a hub between all our devices. The report said over time, wireless devices would become even more popular as hardware improved, and sensors and batteries got better.


Three Quick Rules: Be In, Be Real and Be Bold
This interview with Brad Garlinghouse, chief executive of YouSendIt, was conducted and condensed by Adam Bryant. ... great cultures encourage risk and are tolerant of failure. If you don’t do that, you’re going to end up with a culture that is stagnant and not thinking about the next generation of products and experiences.


Build your own supercomputer out of Raspberry Pi boards
For his baby-supercomputer, Kiepert elected to use Arch Linux. He explained, "Arch Linux … takes the minimalist approach. The image is tiny at ~150MB. It boots in around 10 seconds. The install image has nothing extra included. The default installation provides a bare bones, minimal environment, that boots to a command line interface (CLI) with network support.


6 Ways To Commit Innovation Suicide
When starting innovation, a lot of the same mistakes are made over and over again. Here is how you can recognize and avoid them. These six ways of committing innovation suicide, and how to avoid these pitfalls in practice are from the book The Innovation Expedition by Gijs van Wulfen


CFOs Recognize Need to Adapt for Mobile, Social, Cloud
"CFOs have a strong interest in cloud and mobile technologies,” John van Decker, Gartner research vice president, said in a statement. “SaaS (and cloud-based delivery) is starting to affect business applications. Many CFOs use mobile devices and would be interested in getting access to key business information using these tools. CIOs should use this interest to show how wider investments in cloud and mobile technology could deliver benefits across the organization."


Two-factor authentication: What you need to know (FAQ)
"Twitter made the decision to use SMS [to deliver its second factor] because it makes sense from their position," said Jon Oberheide, a two-factor authentication expert and co-founder and Chief Technology Officer of Duo Security, which uses apps to prove identity. "[SMS is] universal in some respects, all you need is a mobile phone." But Twitter has faced some backlash, he said, because many of the highest-profile Twitter hacks have been against corporate Twitter accounts.


Exploring OpenFlow scalability in cloud provider data centers
The migration to OpenFlow represents a big paradigm shift for most cloud providers. "We tend to think of networking as little pieces of a jigsaw puzzle to assemble any way we want," said Brad McConnell, principal architect at Rackspace. "It takes time to adjust to big changes." Whether OpenFlow will trigger a fundamental shift in networking remains to be seen


The Misunderstanding of Master Data Management
It gets particularly uncomfortable when someone was misinformed about a new technology (and this happens all the time when vendors roll out new products to their sales force). ... A few of my colleagues and I used to call this “bright shiny project syndrome”. While it’s perfectly acceptable to acquire a new technology to solve a problem that it is suited; it can be a very expensive to purchase a technology and force fit a solution that it doesn’t easily address.



Quote for the day:

"The growth and development of people is the highest calling of leadership." -- Harvey Firestone

May 24, 2013

An Information Architecture Vision: Moving from Data Rich to Information Smart
This free White Paper based upon global best practices in business and government assesses the “big data” problem, proposes business and architecture visions, and develops an Enterprise Information Planning and Architecture Model. The vision and model will assist companies to systematically develop their information holdings and related services to achieve business value.


Analyzing updated man-in-the-browser attack techniques
The updated man-in-the-browser (MitB) attacks, referred to as universal man in the browser (uMitB) by Trusteer, allow an attacker to capture any data entered into a Web browser. The new functionality operates much like a general keystroke logger and provides similar data for keystrokes entered into a Web browser.


12 Disruptive Technologies That Are Changing The World
McKinsey's Global Institute discusses this in its latest report, Disruptive Technologies: Advances that will transform life, business, and the global economy. It came up with a list of 12 technologies that could have a potential economic impact between $14 trillion and $33 trillion a year in 2025. The authors write that "some of this economic potential will end up as consumer surplus


Ten IT-enabled business trends for the decade ahead
Big data and advanced analytics have swiftly moved from the frontier of our trends to a set of capabilities that need to be deeply embedded across functions and operations, enabling managers to have a better basis for understanding markets and making business decisions. Meanwhile, social technologies are becoming a powerful social matrix—a key piece of organizational infrastructure ...


Conducting the Agile Interview
Finding the right people to work in an agile shop takes just as much energy and enthusiasm as it does to actually work there. Our Agile Architect shares some of his thoughts and techniques for a more-than-the-normal interview. ... For developers, the shared problem will take the form of a pair programming exercise. Most interviewees have never done formal pair programming


U.S. urged to let companies 'hack-back' at IP cyber thieves
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. ... "Effective security concepts against targeted attacks must be based on the reality that a perfect defense against intrusion is impossible," the IP commission said.


Western Digital releases its first 1.5TB mobile drive
The HGST three-platter Travelstar 5K1500 offers 50% more capacity than currently shipping 1TB 2.5-in. 9.5mm HDDs and 200% more capacity than single-disk 500GB 7mm or 5mm 2.5-in. HDDs, the company said in a press release. The drives also displayed better performance than HGST's current 5400rpm, two-platter drives, according to tests the company performed with PCMark Vantage and PCMark 7.


Data warehouse performance killers -- and how to avoid them
In the 10-minute podcast, McKnight further discussed the performance issues that can affect data warehouse systems and how to sidestep or mitigate them. Listeners will: Learn about some of the major factors that can slow down a data warehouse environment; Hear McKnight's take on whether the growing focus on big data ratchets up the potential for performance problems in data warehouses.


Moving from Partial Views to AJAX Calls
The biggest issue is that they're a mix of data and presentation -- HTML presentation, to be exact. Now, HTML is quite ubiquitous and is available on a wide range of platforms and devices, but let's be honest -- not all consumers of HTML treat it the same way (I'm looking at you, Internet Explorer!). The tools are available to help me generate custom HTML based on the currently connected client, but I like my presentation to be lightweight.


Expanded Hadoop use cases will drive need for new enterprise features
Hadoop performance can be creaky at times. The technology can be hard to program and is by no means crash-proof. Like any relatively new software, it doesn't come with a lot of tools for managing its operations. To top off a quick list of Hadoop limitations: It isn't an out-of-the-box fit for analytics applications, which are becoming perhaps the major use case for Hadoop data.



Quote for the day:

"When handled correctly, genuine innovations are the lifeblood of any company's continued health and success." -- Michael Graber and Jocelyn Atkinso

May 23, 2013

Any Time, Any Place: Citrix CEO Mark Templeton Takes Computing Where Users Need It
Synergy is really where we try to focus on our vision of the new IT that is more and more being described as being a cloud services provider, an IT organization that can use modern infrastructure for running core services as a cloud, an IT that aggregates a wide array of external services in a seamless way to deliver all of those services with a great focus on business value realization.


Integrating asset management as a hosted application: Is it feasible?
If the traditional agent-based approach is implemented, then not all the software and associated data are centrally hosted on the cloud since a SaaS vendor agent is installed on each managed computer. Furthermore, many other SNMP devices like printers and switches remain unreachable. In order to use the agentless approach, the customer is required to open the relevant ports in a firewall between the SaaS vendor application servers and all of the customers’ managed assets, which usually means all LAN segments.


Google updates Drive app with scanner, Analytics with goals templates
The Android version of Drive, in particular, is being updated with improvements for making it easier to create and access documents while on-the-go. This includes being able to "scan" documents by snapping photos of them, which are then automatically saved as PDF files. ... As for Analytics, Google is adding new templates targeted towards retail and marketing professionals looking to keep better track of goals regarding sales and in-store visits.


Popular Ransomware Adds Ability To Steal Victims' Passwords
"Once an exploit kit installs Reveton on a system, the ransomware will start contacting its command and control (C&C) server," wrote Microsoft's Stefan Sellmer in a TechNet blog post. It downloads information about the system's external IP address, for example the Internet provider, city, and country.
While the Trojan goes to work shipping off your information, it's simultaneously installing and running the DLL that locks your screen until payment is received.


Leveraging Tiered Data Analytics Approaches for Better Cloud Utilization
The tiered-data approach became largely impractical, as the cost of DASD-based mass storage systems fell to a point where optical drives and tape drives no longer made economic sense. However, the use of the same tiered approach to storing and managing analytical data within traditional systems, private clouds, and public clouds may, indeed, make sense for a few innovative enterprises.


How do the most successful entrepreneurs come up with their ideas?
How often do you hear people say, “I thought of that idea before they did” or “I came up with that first”? I hate to point out the obvious, but you didn’t think about that idea enough to develop it and actually do something about it. What really matters is that you get moving on your ideas and see what sticks.


One Startup’s Story: The Evolution Of An Outsourcing Strategy
At any startup, the first hurdle is the lack of resources - lack of funds, lack of manpower, lack of time. Outsourcing – or relocating - the work can be a great to overcome those obstacles while controlling costs, increasing efficiency and even making workers happier But it’s not a simple, one-size-fits-all process. In building my company - Dropmysite / Dropmyemail – I found that managing outsourcing was an ever-evolving combination of local and remote capabilities that stays flexible enough to meet changing conditions.


Apple security update: Is it ready for the enterprise?
Apple’s security lags behind Microsoft Corp.’s by as much as 10 years, according to Kaspersky Lab CEO Eugene Kaspersky, who expressed concern in April 2012 about growing malware threats, after the company’s slow response to a critical Java update, made customers’ systems vulnerable to the Flashback Trojan. Apple has since been lauded for smart security decisions, such as eliminating the use of vulnerable Java versions on its devices, and adding support for two-step verification on Apple IDs in March 2013


Enterprise Architects and the Inside-Out View on Value
So many EA professionals are expected to deliver cost or risk reduction, reducing the resources required for delivery of that value, or the risk associated with that delivery. They usually take an inside-out view with a primary focus on efficiency; and struggle to engage with the value delivery side of the equation. But if productivity = value/resources, then the challenge is to both reduce resources and deliver enhanced value.


Online learning made easier for India's schoolchildren
In today's day and age, the pace of learning has become much faster and a lot of kids these days are very savvy with computers and online activities. That also makes it easy for them to better adapt and interact with online learning, compared even with conventional forms of learning. This opportunity was realized by Indian portal, Meritnation.com, which is operated by Applect Learning Systems.



Quote for the day:

"High achievement always takes place in the framework of high expectation." -- Charles Kettering

May 22, 2013

Optimizing Disaster Recovery for the Software Defined Data Center
Zac Streelman, Manager, Information Technology at Leupold and Stevens was looking for a disaster recovery (DR) solution that would extend the flexibility of virtualization to his DR environment. ... The board of directors was specifically asking what the current solution was and what service levels could the infrastructure deliver. Learn how Zac made his decision and how it affected his infrastructure in the way his board of directors wanted.


Hitachi Data Systems launches HCP Anywhere for online file sharing
HCP Anywhere lets users collaborate on files through any device, using the Hitachi Content Platform (HCP) as back-end storage. Users see the files through a Windows Explorer-like interface, and file changes and deletions show up in real time. HCP Anywhere comes a week after NetApp launched NetApp Connect, based on its acquisition of ionGrid, and two weeks after EMC extended the file-sharing capability it acquired from Syncplicity.


5 Emerging Technologies That Every Office Will Have In 2020
During a phone conversation, for instance, voice recognition will be constantly running in the background to pick out context — such as the mention of a meeting, which it will then add to your calendar. It could also be used for real-time translations. And, for your computing devices, a password won’t be necessary since front-facing cameras will use facial recognition to keep others out.


Wait continues for wireless energy consumption remedy
"We have a set of technologies and a portfolio of ideas that if we built products based on them we can handle traffic growth and still make energy consumption on networks go down by 90 percent," GreenTouch technical committee chair and head of green research at Bell Labs, Dr. Thierry Klein, said. The consortium itself, however, is not interested in productising the technology — that is left up to individual members, he said.


Researchers find critical vulnerabilities in popular game engines
Security researchers Luigi Auriemma and Donato Ferrante from Malta-based security consultancy firm ReVuln found memory corruption and buffer-overflow issues in "CryEngine 3," "Unreal Engine 3," "Hydrogen Engine" and "id Tech 4." These are game engines that are used in video games like "Quake 4," "Crysis 2," "Homefront," "Brink," "Monday Night Combat," "Enemy Territory: Quake Wars", "Sanctum", "Breach," "Nexuiz" and many others.


"Disruption redefined" - why business is ready for the CDO
In line with this fresh new focus on disruptive technologies, we are beginning to see the emergence of a new member of the board: the chief disruption officer (CDO), who can act as a channel and a focus for this bold approach to strategic decision-making. ... So for this vision to become reality in today’s business environment, CIOs and IT directors need to ensure they are feeding disruptive ideas to the board.


We need more glass half-full risk managers
The risk manager needs to stop seeing the negative in everyone they interact with. and everything they perform. Instead, we need to be more focused on finding the positive in those around us, and then working on bringing out these positives to provide better risk management information and decisions. We need to be more engaging with others, and really show how we can work together and help each other to succeed.


HP security chief: How big data can catch hackers red-handed
"If you look at the breaches today, they are typically compromising user credentials. They steal my passwords and then they look like me. So you actually want to be able to find weird behaviour," Gilliland said. "There's a profile I follow and if my behaviour goes outside two standard deviations from that normal behaviour, you should probably investigate that." Tools developed for big-data analysis come into their own in this role, according to Gilliland.


Zalora launches cash-on-collection in Singapore via 7-Eleven
This potentially opens up a new market such as those without credit cards, and provides the round-the-clock accessibility for customers unable to accept deliveries at home during the day. The move follows a similar one by e-tailer Qoo10 in Singapore, which was limited only to facilitating cash payment collection. Last month, Amazon partnered FamilyMart in Shanghai, allowing customers to pay for and pick up their goods.


Telenor cyberespionage attack has Indian origins
During their investigation, the Norman researchers established correlations between that attack's command-and-control infrastructure and other malware and domain names, uncovering what appears to be an ongoing large-scale cyberespionage operation of Indian origin that has been active for almost three years.



Quote for the day:

"A good plan today is better than a great plan tomorrow." -- General George S. Patton