July 22, 2013

UK spies aren’t breaking law by using PRISM data, security oversight committee claims
The committee issued a statement on Wednesday in which it said it had extracted “substantive reports” out of UK intelligence service GCHQ, which detailed which citizens were monitored through PRISM, what information was gleaned, which warrants were obtained and so on. The committee also talked to the NSA and Congress.


Big data privacy concerns spur research, innovation
Masses of mobile phone data already exist, said panelist Alex “Sandy” Pentland, director of MIT’s Human Dynamics Lab and Media Lab Entrepreneurship Program. “Companies gather it but are scared to use it,” he said. “It’s politically controversial. But we have to start to see that cell phone and public data is for the public good.”


Closing the Big Data Skills Gap Requires Educational Innovation
Here's the issue that the IT industry is already starting to deal with: Big data creates lots of new, well-paying jobs but in a digital update of the prime maxim of Adam Smith, the father of modern economics, demand will outstrip supply, some experts contend. And it will get worse, because those newly graduated data scientists are too few in number and possess the wrong skills needed to fill that big data gap.


6 Surprising Secrets of Truly Great Bosses
The very best managers do the exact opposite of what the average manager does. At best, following conventional wisdom results in mediocrity. Truly great bosses don't just march to the beat of a different drummer, they convince everyone else to march along with them. Here's how:


When Will ‘Bursting’ Become Acceptable Boardroom Terminology?
The “so what” factor here comes down to how CIO’s are referring to cloud and explaining its “burstability” (not a real word) to the CEO; indeed, this use of the term bursting has been as widely adopted by cloud hosting providers such as Amazon Web Services and Rackspace as it has by companies selling broader IT services such as HP, IBM or any of the other usual “big vendor” suspects.


Data, Metadata and the Assumption of Quality
We have no way of knowing if the underlying operational data is accurate (as well as other aspects of data quality), nor do we have any way of verifying any aspect of the information quality. Some of the metadata could be verified by cross-referencing other sources (e.g., for books, we could verify the metadata with the publishers and other sellers such as Barnes & Noble).


Is there room for network admins in software-based networking?
The good news for IT professionals is that virtualization reduces costs and improves flexibility, but it increases complexity. Management software companies have diligently worked to develop solutions that take the pain out of this complexity. In fact, it is management software that allows admins to wrangle herds of servers with drag and drop -- not the virtualization technology itself.


How could anyone confuse BPM and event processing?
The fact is that more than a few corners of the marketplace know very little about the difference between BPM (business process management) and what’s typically called CEP (complex event processing). These two concepts are very different and understanding those differences in today’s business climate will mean success or failure for many organizations.


Sony to sell 'world's first' SD card-based backup for PCs
Sony announced the product on Thursday, and said it will be available in Japan from August 20 in 16GB, 32GB, and 64GB versions. The backup software will initially support only Windows-based machines. The cards are rated Class 4 speed, a standard that provides write speeds of at least 4MBps.



Quote for the day:

"No man can think clearly when his fists are clenched." -- George Jean Nathan

July 21, 2013

It's getting warmer in some data centers
The U.S. General Services Administration, as part of data center consolidation and efficiency efforts, has recommended raising data center temperatures from 72 degrees Fahrenheit to as high as 80 degrees. Based on industry best practices, the GSA said it can save 4% to 5% in energy costs for every one degree increase in the server inlet temperature.


eProvided SD Recovery Firm Confirms Samsung's Mass Production of 128GB NAND Chips
With SD recovery problems, it's important to remember that even though digital media is safer to use when compared to HDD's, digital devices and USB flash drives, they do fail and a service to recover USB drive devices will be badly needed. Compact flash data recovery services have also been used for years by professional and amateur photographers experiencing SD recovery issues.


User Acceptance Testing (UAT) for Software Systems
User Acceptance Testing should never be used to detect programming bugs, integration bugs, or design flaws. These should be detected by the previous testing phases: development testing and Quality Assurance testing. To achieve these goals UAT must be conducted in a production-like environment and the system exercised by at least one representative of every functional group in the user community.


Mahendra Singh Dhoni's leadership style offers invaluable lessons for managers
MS Dhoni, India's most successful cricket captain, is well on his way to be regarded as one of the greatest leaders the game has seen. In the past, people have attributed his success to luck, timing, good fortune and the like. But on closer analysis of his success, we see a clear pattern emerging. Dhoni's leadership style offers invaluable lessons to managers at all levels.


Why In-Memory Computing Is Cheaper And Changes Everything
Some people think that we’re talking about in-memory because of all the hype that’s been going on in the market – but it’s not just SAP. Every single vendor out there is getting involved in in-memory technology. ... You won’t have tape drives, you won’t have disk drives. You’ll be using flash and memory. Flash will be your backup, your archive, and memory is where you’re going to run everything.


What Data Do the Five Largest Tech Companies Collect? [INFOGRAPHIC]
Baynote has created an infographic that shows the vast amounts of different types of data that is collected by the five largest tech companies in the world: Google, Apple, Facebook, Yahoo! and Amazon. Not surprisingly they collect vast amounts of different types of data, ranging from search queries, profile information to even your phone number.


Some Data Center Operators Take Their Chances with Floods
One thing is certain, experts say: Few IT organizations -- even those that suffered or narrowly escaped damage during recent major storms -- are thinking long term. Most IT leaders are, if anything, taking the path of least resistance and least expense. For instance, the response to Hurricane Sandy, on the East Coast at least, "is nothing more than hardening existing data centers," says Peter Sacco


IT Cannot Be Only the CIO's Responsibility
Accountability for some of these areas reside with the CEO and the other members of the C-suite (we are assuming CIO is a member of the c-suite), for others with LOB manager, and some will be shared. What is clear is that they are not the sole responsibility of the CIO. All members of the C-suite needs to recognize and embrace their fundamental roles.


SAN Vs NAS Storage Network
A SAN (storage area network) and NAS (network attached storage) are two primary options for large storage across a network. Both have storage devices unique to their solution and specific network connection configuration. Although there are clear differences between the two, vendors are beginning to package the two as one, leveraging the benefits each solution provides.


Today’s datacentres are not fit for the cloud, shows study
“Many datacentres that exist today are based on 20-year-old technologies and they can no longer keep up with demand,” said Jason Nolet, vice-president datacentre switching and routing at Brocade. “Virtualisation and cloud models require greater datacentre network agility and performance, as well as reduced operational cost and complexity.



Quote for the day:

"One of my guiding principles is, don't do anything that other people are doing" -- Seymour Cray

July 20, 2013

Things CIOs need to know about Microsoft reorganisation
Last week's big Microsoft reorganisation should have caught exactly zero people by surprise. A couple of high-ranking executives departed, and departments were shifted so the senior leadership team can purportedly focus on engineering excellence and becoming more relevant across a spectrum of devices. But what does this mean for the CIO? What do Microsoft's internal machinations imply for its corporate customers?


Cyber drills like Quantum Dawn 2 vital to security in financial sector
"Cybersecurity is a top priority for the financial industry," Schimmeck noted. "This exercise gave participants the opportunity to run through their crisis response procedures, practice information sharing and refine their protocols relating to a systemic cyber attack." SIFMA will review the results of the cyber exercise with its members to identify areas for improvement, he said.


Is the Purpose of Analytics Just to Turn a Buck?
As a business analytics professional, it’s often too easy for me to think about analytics in the business context (i.e. how they can reduce costs, increase profits, speed time-to-market, improve employee productivity etc.) In fact, the mission for analytics can easily cross over from the land of shareholder value to safeguarding and improving the well-being and long term sustainability of other stakeholders.


EMC Avamar: High Performance Backup and Recovery For a Software-Defined Data Center
For CIOs, the data protection equation is rapidly becoming further complicated by a growing trend among corporate departments to store “copy data” as an internal way to deal with their own needs for local data backup, and protection. Propelling the data copy problem is a toxic brew that is one part fear of government regulations and compliance mandates on how companies function ...


In the online hunt for criminals, social media is the ultimate snitch
Nancy Kolb, the program director who oversees the center for social media at the International Association of Chiefs of Police (IACP), says there were certain forward-thinking police departments that started venturing into social networks as early adopters during the MySpace days, but this really took hold later. “It was around 2009, 2010, 2011, where we really saw an exponential increase and huge growth in terms of law enforcement agencies using social media.


The Changing Role of the IT Professional
SDN, however, is not the only factor driving change in the role of role of the network professional. The convergence of technology is also driving change. Many IT organizations have begun to implement systems that integrate compute, storage and networking. Typically these systems come with a management system that enables a single administrator to manage the entire system.


Four realities for the future of corporate IT
IT has always had an important role in driving productivity but traditional approaches such as process automation and outsourcing are running out of steam. ... CEB has surveyed tens of thousands of business leaders and frontline employees to understand the new work environment. The workplace has been reshaped by four realties. CEB’s data shows that the realities are near universal; they are not limited to desk-bound employees nor to the millennial generation.


The Value of Vision Series - An Interview With Doug Conant
Jesse Lyn Stoner shares the views of a leader who is not spouting theory, but who is speaking from his own personal experience - Doug Conant, newly appointed Non-Executive Chairman of Avon and the former President and CEO of Campbell Soup, where he led the company through a dramatic transformation, reversing the declining trend in earnings and employee engagement.


Banks big and small are embracing cloud computing
Big banks have generally migrated less of their activity to the cloud than newer, smaller ones. This is partly because of legacy systems, partly because of regulatory concerns about data security and privacy. But the pressure to reduce spending is likely to force the pace of change. ... One way of improving cost-income ratios is to lob activities into the cloud.



Quote for the day:

"Let a man lose everything else in the world but his enthusiasm and he will come through again to success." -- H. W. Arnold

July 19, 2013

Has virtualization killed tape?
But tape still has some serious advantages to disk storage systems. For one, the cost per Terabyte is relatively low, and it is very portable. Linear write and read streams also perform quite well for current tape systems. But, my preference is for disk systems. I have horror stories from tape; in fact, I have five stories that are all quite entertaining as to why I hate tape. Find me in a pub sometime, I’ll tell you the stories; they’re worth the listen.


PayPal to let Australians use their digital wallets in real-world cafes
"We realised about a year ago with that digital wallet, for it to truly be essential to consumers lives, we need to give them access to it in their everyday life," he said. "When you're getting your morning coffee or buying your groceries or getting a sandwich for lunch, PayPal was not relevant in consumers' lives a year ago. "And now we're starting to innovate at the retail point of sale."


Surviving the coming datacenter apocalypse
So what kind of IT professions are the most valuable in a Cloud-centric world? Any job that deals with architecting, implementing and managing cloud stacks and the virtual infrastructure that sits beneath it, whether they are on-prem, hybrid or totally off-prem. Cloud security and cloud storage experts. SaaS transition/software migration types of folks who understand how to move a legacy system with complex multi-tier apps to a hybrid or off-prem model.


3 Toxic Employees You Need to Fire Now
"You can have someone who is a very good technical performer but that makes other people in the office go home crying," Benoit says. "If you have people who are interfering with the performance of others, you need to consider letting them go." It's a good idea to consult legal counsel before you terminate someone for their behavior to ensure you've protected yourself. But, in her experience, Benoit says these three types of employees usually just have to go.


Sencha Space HTML5 App Management Platform Launches
"This is an interesting development and a sign of the coming together of various mobile software and services markets," Al Hilwa, an analyst with IDC, told eWEEK. "As organizations embrace mobile applications, they are increasingly looking at simplifying their vendor portfolios and will consider offerings from their existing technology providers in adjacent markets. Sencha's reputation in HTML5 tools and frameworks will give this offering good visibility with existing Sencha customers."


Java 7 vulnerability opens door to 10-year-old attack
According to Gowdiak, the vulnerability is located in the Reflection API (application programming interface), a feature that was introduced in Java 7 and which has been the source of many critical Java vulnerabilities so far. Security Explorations confirmed that its PoC exploit code works against Java SE 7 Update 25 and earlier versions, he said.


Smart mobile strategies curb wasteful IT spending
"Oddly enough, I've seen more companies not spending money on mobile efforts because they don't know where to start," Jack Gold added. "However, once they start, it's really easy to lose budgets to disposable spending because there was no plan in place." Further, the shift to mobile computing gives IT departments the chance to become a strategic partner with the business side of the company after years of having the not-so-fun task of keeping the lights on.


DDoS attacks getting bigger, stronger and longer
"This quarter we logged increases for all major DDoS attack metrics, and some have been significant. DDoS attacks are getting bigger, stronger and longer," said Stuart Scholly, president at Prolexic. "We believe this growth is being fuelled by the increasing prevalence of compromised Joomla and WordPress web servers in increasingly large botnets."


CIOs Must Lead Outside of IT
Most CIOs find it relatively easy to convince an executive team to invest in a technology that increases near-term revenue. They find it considerably harder to ask their colleagues to invest in a major infrastructure upgrade that will take 12 months or more before delivering direct business benefit. But all CIOs need to find a way to convince their peers that without these infrastructure investments, they will be mortgaging their company's future.


What Happens When we Die: Estate Planning of Digital Assets
When administering digital assets for a decedent‘s estate, there are eight steps that experts recommend fiduciaries take. In addition to these eight steps, a fiduciary should also take care to adhere to common practices required by law when dealing with digital assets. By following such steps, a fiduciary can begin to decrease the amount of hardship and stress associated with digital estate planning.



Quote for the day:

"The true sign of intelligence is not knowledge but imagination." -- Albert Einstein,

July 18, 2013

Predictive Analytics: Beyond the Predictions
Predictive analytics are applied in the process of determining business events that are likely to occur and actionable. The probability threshold of "likely" differs from company to company and risk factor to risk factor. A risk-averse company may decide to prepare for a relatively low probability event that comes with a particularly bad outcome. Companies that are more risk tolerant, unaware or distracted by other projects will be less poised to take action.


Huawei sees 5G's emergence by 2020
Since LTE, along with its next generation LTE-Advanced (LTE-A) and LTE-Beyond (LTE-B), had only just started gaining traction, and will start to be more popular in 2014, the natural progression would be for 5G to be rolled out in 2020, he explained, speaking to ZDNet Asia at an interview here on Thursday. Mobile broadband technologies have always been introduced before widespread rollout of the network itself, and 5G will be no exception, Zhou observed.


Post-Trade Processing Solution to Help Banks Transform their Operations
“Investment banks need to transform and are actively seeking solutions that help them enter new markets and comply with regulatory changes, all while meeting client demands,” said Steve Racioppo, Chief Revenue Officer, Broadridge Financial Solutions. “With Broadridge’s technology as the engine behind the solution and Accenture’s expertise in capital markets, we can see this solution becoming the industry standard for post-trade processing.”


New Intel Chief Sees $150 Atom Tablets This Year
Speaking on his first quarterly earnings call for Intel on Wednesday, new CEO Brian Krzanich acknowledged Intel's missteps and said it can't afford to be caught off guard again. "We've not always lived up to the standard we've set for ourselves," Krzanich said, admitting that Intel was "slow to respond" to the tablet market. There will always be "another big thing," he said, and Intel must be constantly "scanning" for it.


Most enterprise networks riddled with vulnerable Java installations
The most widely deployed Java version, according to Bit9's data, was Java 6 Update 20, which was installed on a little over 9 percent of endpoints. This version of Java is vulnerable to a total of 215 security issues, 96 of which have the maximum impact score on the Common Vulnerability Scoring System (CVSS) scale, Bit9 said.


Meru: 802.11ac specification support on single-channel architecture
Meru's single-channel, MobileFlex architecture allows adjacent access points to share the same channel, whereas most other wireless LAN vendors rely on channel segmentation from one access point to another to avoid interference. The single-channel capabilities of Meru's new 802.11ac-enabled access point -- the AP832 -- eliminates the danger of channel overlap that exists in segmented networks, allowing Meru customers to use the full 80 MHz channels.


Dell's future gets messier: Shareholders expected to vote against buyout?
Shareholders were expected to vote tomorrow (Thursday, July 18). But, as if things weren't messy enough, that arrangement was also called into question earlier this week. The possible delay follows a move by prominent Dell investor Carl Icahn last week in which the business magnate dropped hints touting his new proposal to the company founder's plans once again.


Hidden cost of cloud computing is CIOs’ biggest concern
“Effectively monitoring and managing modern cloud-based applications and services requires a new approach designed to work in today’s complex, hybrid and dynamic environments. Failure to do so could have a hugely detrimental impact on reputation, customer loyalty and revenues,” said Mendel. The fact is that most traditional monitoring tools simply don’t work in the cloud, he warned.


Outsourcing, adieu: Companies retake the reins on IT services
While it would be misleading to say that insourcing is a new phenomenon -- companies have been cancelling major outsourcing deals as long as there have been major outsourcing deals -- indications are there is a shift in thinking underway. ... Whether they're ready to cut the cord or not, companies should take heed of these converging forces as their outsourcing deals come up for renewal.


Problem Areas in Project Communications – Part 2
Once you are given a project, your first task should be to ensure that you and management are in complete agreement. What is the purpose and the desired end result? You may execute a project according to the highest standards and come in on schedule and within budget. However, if you’re not meeting these key individuals’ expectations, then you’re not successfully delivering on the project.



Quote for the day:

"Someone's sitting in the shade today because someone planted a tree a long time ago." -- Les Brown