July 27, 2013

Open-source project, Crypton, seeks to make encryption easier
"We wanted to develop more of a privacy platform that other developers and companies could use to integrate privacy in their applications without having to be cryptographers," Oberman said. "We want people to understand the power of privacy and understand it is not an interference and not an inhibitor to product development."


Integration on the Edge: Data Explosion & Next-Gen Integration
Today's "shadow IT" world - where every department seems to have the capability and desire to implement some form of IT infrastructure has resulted in a lot of developers driving the charge for Cloud adoption in organizations. Dave Linthicum rightly points out that the best approach is to start at the top.


New Onshore IT Outsourcing Centers Outnumber New Offshore Locations
Onshore centers can present unique challenges to service providers, including higher wages and overall cost of operations, reduced scalability, and--perhaps surprisingly--increased attrition rates. "Attrition in onshore locations for some transactional skills, such as basic applications development work or transaction processing, may be higher than offshore locations given availability of alternate career options in these locations, says Dani.


Top 7 Reasons Why SOAP and REST Interfaces Are Littered With Vulnerabilities
Unfortunately, their rapid rise in popularity also brings significant and damaging security vulnerabilities. Understanding how to provide web and mobile application security against these vulnerabilities is only one small step in the right direction. Developers face a number of challenges when it comes to building secure code. Let’s look at a few of them:


Ubuntu: One OS, one interface, all devices
As Mark Shuttleworth, Canonical and Ubuntu's founder said at OSCon, the major open-source convention held in Portland, OR, "Convergence is the core story. Each device is great, but they should be part of one family. On any device you'll know what you're doing. One device should be able to give you all the experiences you can get from any one of them."


6 wishes for SysAdmin Appreciation Day
Reportedly it's kind of a big deal in Russia. And why not? All long-suffering peoples deserve their own day of celebration. Mothers get flowers, chocolate, and breakfast in bed. Fathers get ties, power tools, and craft beer. Sysadmins get ... O'Reilly books? Energy drinks? Nerf guns? Actually, high-calorie foods top the list of traditional offerings. But maybe we can do a bit better this year. Maybe we can give sysadmins a voice and allow them to ask for what they really want.


Health Data Breach Trends: An Analysis
One thing that hasn't changed: The No. 1 cause of breaches continues to be lost or stolen unencrypted devices and media. It's amazing that so many breaches still involve unencrypted devices. The importance of encryption should top-of-mind by now, given all the publicity about breaches since 2009. But perhaps these continuing breaches are proof of just how difficult it is to manage mobile devices, especially as BYOD proliferates.


CIOs Issue Social Media Privacy Practices Guide
The guide, which explains privacy best practices for establishing a social media program, addresses various ways the federal government can use social media for information sharing, situational awareness and to support agency operations. ... The guidance warns against posting information collected about specific individuals, seeking to connect with other internal or external personal users, accepting other internal or external personal users' invitations to connect; or interact on social media.


Business and enterprise architecture - match made in heaven
Often business process management and associated discipline such as business architecture are seen or managed in isolation of the overarching enterprise architecture construct. However the business architecture and enterprise architecture complement each other well to get the best value from each other.


How to Build Reliable Systems
Mission-critical and enterprise-wide computer systems today are often very complex with many moving parts and even more interfaces between components; this presents special challenges even for expert configuration management engineers. These systems are getting more complex as the demand for features and rapid time to market provides unique issues that many technology professionals could not have envisioned even a few years ago.



Quote for the day:

"Patience accomplishes its object, while hurry speeds to its ruin." -- Saadi

July 26, 2013

The Odd Couple: Hadoop and Data Security
There are more missing pieces concerning data, as nothing was built into the Apache project. There was no standard way for encrypting data, and neither was there any way for regulating who can have what kinds of privileges with which sets of data. Obviously, that matters when you transition from low level Web log data to handling names, account numbers, account balances or other personal data.


Choosing cloud infrastructure for business and technology flexibility
The goal of the cloud is to produce economies of scale in resources and to allow a provider to offer a service that saves the buyer money, but at the same time earns a profit for the seller. Striking this win-win balance is the central mission of deploying cloud infrastructure and platforms, and that mission can be fulfilled in three ways:


Wall Street’s Exposure to Hacking Laid Bare
Mark Clancy, said that “for the financial services industry, cyberthreats are a constant reality and a potential systemic risk to the industry.” ...Over the last few years, accidental technological mishaps at the trading firm Knight Capital and the Nasdaq and BATS stock exchanges have revealed how even isolated programming errors can quickly ripple through the markets, causing significant losses in minutes.
But right now there are no national policy guidelines regarding the use of LPR and the data it generates. LPR records data on the movements of vehicles belonging to both ordinary citizens and criminals, and the data may be stored forever or may expire in 90 days if it's not a "tag of interest," depending on the state. And the data isn't 100% accurate.


Disaster Recovery - Presentation
Check out this presentation by Cisco Asia's consulting engineer Kwai Seng, where he explains the various multi-site DR scenarios, with the possible solutions. He also compares the site selection techniques, namely, HTTP redirection, DNS based site selection and Route Health Injection based routing.


Review: PsExec is a Windows power user's best friend
Another neat little feature on the docket for PsExec is the ability to run a command remotely as the SYSTEM user. What this essentially means is that, when SYSTEM is called, you effectively have nothing stopping you or getting in your way from a permissions standpoint and you become a super user. This is much akin to root access on Linux, which means that you are playing with fire.


Smartest Way to Manage Your Business? Get Ready to Sell It
Even if you never sell your business, making it fit-for-sale is a tremendously worthwhile discipline. It ensures you are building an asset that other people can understand and respect. Being fit for sale means you run a tight ship that won't run aground easily. So even if you intend to hand on your company to the fifth generation--making it sellable is a great way to run it now.


Innovation doesn't live on democratic leadership
Sharing lessons he had learnt from spending 30 years in Silicon Valley, Sculley said disruptive innovation does not exist in an environment built on consensus. "There's no democracy in successful high-tech companies and it's actually pretty good when you have a quality leader. These are founders, and founders have a special position.


The Seven Stages of Advanced Threats and Data Theft
A report from Websense says--Anti-virus and URL filtering products once were sufficient protection against information security threats. But targeted attacks have changed things. Today’s advanced attacks occur in seven stages that can result in data theft.


The DaaS Disruption: How the Data-as-a-Service Model is Transforming Business Intelligence
DaaS is built on the idea that users can and should have easy access to mission-critical data in real time and without any major lags or strains on IT solutions in the process. Through combination of standardization, virtualization and automation, DaaS transforms the BI data gathering process from what used to involve multiple departments into a singular process that can be executed immediately and simply from a web interface.



Quote for the day:

"A good objective of leadership is to help those who are doing poorly to do well and those who are doing well to do even better." -- Jim Rohn

July 25, 2013

Disruptive Solution Secures Data Anywhere, Anytime — Q&A with Ionic Security’s Chairman
Startup Ionic Security’s platform touches data at its inception as it’s being created, which gives enterprise business policy owners and security group managers the ability to control that data no matter where it ends up anywhere in the world, in real time, as it’s being accessed. Founder, CTO and chairman Adam Ghetti explains how this cutting-edge security solution works and the path of its development. 


Insights Ahead: The Rise of Analytics as a Service
The benefit AaaS delivers is agility and scalability. This is valuable, given that modern analytics is now effectively replacing the management reporting processes designed for an age of limited data that changed slowly. By contrast, executives now want to work with dynamic data that reflects real-time reality. AaaS can not only deal with that dynamic data but also adapt quickly to solve new problems as they emerge.


Choosing an open source software license for your development project
This is not a discussion about the pros and cons of OSS development, but it is a guide for those who currently develop in the open community and for those who wish to learn more about the various licensing options that are available for OSS. You will also want to consult with a legal expert before adopting any software license for your projects.


Cloud Computing for the CFO and the entire C-Suite
Executives responsible for customer care and support will get the IBM Watson Engagement Advisor, which uses cognitive computing to enable personalized customer conversations. The head of HR is targeted for the IBM SmartCloud for Social Business, which promises to find, analyze, source and acquire the best talent. Supply chain execs, chief procurement officers, the CFO, and even the CIO have been targeted.


Disaster is Coming. Are You Ready?
It doesn’t take a once-in-a-hundred-years kind of storm to trigger a power outage or disk failure. If you operate a small or mid-size business, now is the time to make sure you have the right continuity plans in place. There is good news: The emergence of cloud services now enables every business to have the kind of continuity plans that bigger companies routinely do.


How to Foster an IT Youth Movement
The Jet Propulsion Laboratory (JPL) IT Outreach Program aims to entice students of all ages and backgrounds to consider careers in IT. We showcase real uses of IT in a fun and energetic way. The JPL IT Petting Zoo began as a cost-effective way to evaluate emerging technologies and their viability for JPL.


Cloud's effects on data center design principles, locale
Cloud computing's influence on data center design principles is still emerging. Companies implementing a private cloud platform should have undergone rigorous application rationalization, hardware virtualization and consolidation exercises. This may have left them with around 20% to 40% of the original data center equipment


Microsoft to offer Java as a service
Microsoft will offer the Java Standard Edition (Java SE) by the end of the year both as a stand-alone PaaS (platform as a service) and as component of a Windows Server IaaS (infrastructure as a service), both on the Windows Azure service. For the Java runtime, Microsoft has commissioned Azul Systems to develop and maintain a version of the Java OpenJDK, the reference implementation of the Java Virtual Machine (JVM) and runtime for Java SE.


EMC backup changes planned around convergence, ViPR
The changes are part of a strategy to re-shape EMC's data protection technology. David Goulden, EMC president and chief operating officer, said the vendor has spent $5 billion over the last 10 years in backup acquisitions and research and development. Now it has four backup apps to go with its target deduplication Data Domain boxes.


Almost half of India Web users attacked by local malware
While these numbers are astonishing, the numbers are most likely even higher for mobile users, assuming users have mobile protection to begin with. The same types of exploitation for computers exists for mobile devices, but with even more opportunities, such as downloading and installing apps from places that are neither trusted nor verified sources.



Quote for the day:

"The measure of success isn't if you have a tough problem, but whether it's the same one you had last year." -- J.F. Dulles

July 24, 2013

Building Scalable Applications in .NET: Introducing the FatDB Distributed Computing Platform
Even today, it’s common to find many disparate technologies duct-taped together into a byzantine edifice that tends to be brittle, slow and overly complicated. The current explosion of new Cloud-, PaaS- and NoSQL-related technologies than can handle many of these shortcomings is no coincidence; the blunt reality is that “doing it right” and meeting the needs of stakeholders is hard and requires abandoning old patterns and adopting new ways of thinking.


Comparing Windows Defender in Windows 8 vs. third-party malware tools
But users should be aware that the Windows Defender that ships with Windows 8 is not the same Windows Defender available to previous Windows versions. The original Windows Defender is an anti-spyware app users can download for free. Windows 8 Defender is essentially a rebranding of Microsoft Security Essentials (MSE), an antivirus program also available for free for earlier Windows versions.


FDA asks hackers to expose holes in medical devices, but many researchers fear CFAA & jail
Black Hat USA, which normally has 80-90 talks, will feature a record-breaking number of 110 talks this year. SC Magazine wrote about how the fear of being sued or worse—going to prison—makes some security researchers edgy about disclosing vulnerabilities. And every year after Black Hat and Def Con, some red-faced company whose product was hacked will point fingers and make nasty accusations


Time and Distance Enemies of Agile Project Management
With physical distance comes increased opportunity for misunderstanding or delayed communications. Even if team members are just on a different floor of the building, you need more checkpoints and redundant communications to keep everyone in sync. ... The project isn't that important, doesn't have the right team members, serves as a political football, has goals that are a moving target or has simply been ill-conceived


Who Can Get Your Data Operations Up to Speed?
“Your ability to hire somebody for that role requires you to have a rather mature and robust organization, otherwise I think it’s always going to be the CIO’s ultimate responsibility,” says Manley. “And for me, the chief data officer is still somebody reporting to the CIO, somebody still a part of the technology organization. ... very, very large insurance businesses, what they’re doing as a result of the wild and uncontrollable nature of data that has grown in a 100-year-old organization, is a bit different, since I started from scratch.”


NTSB calls for wireless technology to let all vehicles 'talk' to each other
The board recommended that the National Highway Traffic Safety Administration develop standards for "connected-vehicle technology" — wireless components that would let vehicles communicate on the road. ... With those standards in place, "NHTSA can then require this technology to be installed on all highway vehicles," Deborah Hersman, chairman of the NTSB, said at the board's meeting Tuesday. "This technology more than anything else holds great promise to protect lives and prevent injuries."


CIOs and the chief data officer: Who's the pioneer and who's the settler?
"[CIOs] have enormous portfolios to manage -- everything from data centers, cloud, desktop support, mobile; but the reality is that the business is trying to deal with being part of an integrated information economy," Casey said. "For organizations trying to be more competitive … folks can't wait for IT to keep up anymore."


The 4 Blind Spots That Could Lead to Failure
Blinders are also used by small-business owners, but they shouldn't be. Typically, business owners want to concentrate on sales, expenses and employees—and are "blind" to other things happening around them. They believe almost every problem can be solved with more sales, more productive employees and fewer expenses. In business, what you don’t see is often what hurts your business the most. I liken it to getting hit in the back of your head with a 2x4. You never see it coming.


Is Your Organization Ready for Total Digitization?
How are enterprises managing the spread and scope of total digitization? We at MIT CISR have found that enterprises are using one or more of three approaches to managing total digitization: convergence, coordination, or a separate digital innovation stacks approach. Each approach has very different objectives and measures of success.


WebLogic + Coherence + Tuxedo = Cloud Application Foundation
Cloud Application Foundation has been optimized to run on Oracle's Exalogic Elastic Cloud appliance for private cloud deployments, and can also run on public clouds, like the Oracle Java Cloud service. It comes with a new integrated management framework (install, update, patch and provisioning) for WebLogic Server, Coherence and Oracle Web Tier.



Quote for the day:

"The discipline of writing something down is the first step toward making it happen. " -- Lee Iacocca

July 23, 2013

Will CSOs become CROs in the future?
At a high level, the new responsibilities include understanding your company's risk profile and risk appetite and then mitigating the risks accordingly. Greg Thompson, vice president of enterprise security services and deputy CISO at Toronto s Scotia Bank, already sees his role evolving into something like head of operational risk management. Scotia is Canada's third largest bank.


Cisco: Multimode Small Cells Coming Early 2014
"The 3G and Wi-Fi pieces are mature," Mishra said. "The work we are doing is on LTE on the access side and core network infrastructure side. It's all available today with our packet core, so we can reuse that." As the company moves to multimode, it's still focusing on areas where network congestion is most acute, such as indoor venues.


F5 data center firewall aces performance test
The F5 firewall moved static objects over SSL at rates that met or exceeded the capacity of the Avalanche test tool, moving 10- and 512-kbyte objects at 17.288G and 20.919Gbps respectively. Both numbers are at least 1Gbps faster than those for the Avalanche tool running back to back with no firewall inline.


From evolution to revolution with the Internet of Things
The idea is that all of our devices will be able to communicate with each other to assist users in businesses in doing their jobs, with particular influence on hospitals and factories. But General Electric hijacking the conversation on the Internet of Things shouldn't hide the fact that this isn't a new idea, argues David, along with his guest, Adrian Bowles, founder and CEO at STORM Insights Inc.


How Criticism Creates Innovative Teams
When ideas are still being developed or decisions still being considered, criticism and constructive conflict are vital to testing the value of the ideas and helping increase that value. Conflict is an indicator that diverse viewpoints are being considered and that the competition for ideas is still ongoing. During this competition, ideas are strengthened through further research, consideration or through the blending of different ideas into one stronger concept.


CRM-Cloud Relationship Management
Michel van Woudenberg, Vice President, CRM, Oracle Asia Pacific, on CRM cloud is revolutionizing the customer space: "I think a lot of industries in India are actually quite in the forefront on adopting cloud in order to be differentiating towards their customers. I would say the government in India and BSFI, especially the public banks, are a bit behind compared to other regions in Asia Pacific."


750 million phones vulnerable to spying: Hack SIM card via tainted text to get root
Give this German cryptographer two minutes on a PC and he can send a send a secret text message that contains a “virus” to a mobile phone’s SIM card, and then basically get “root” and take over the phone. That text can allow him to eavesdrop, make purchases via mobile payment systems and otherwise “trick mobile phones into granting access to the device's location, SMS functions and allow changes to a person's voicemail number.”


User Defined Field
Usually the best option is to use a Serialized LOB, essentially creating a large text column into which you store the user-defined fields as a JSON or XML document. Many databases these days offer pretty nice support for this approach, including support for indexing and querying based on the data structure within the LOB. ... Another route is using some kind of attribute table. A table might look something like this.


5 Exciting Tech Companies You've Probably Never Heard Of
The new technologies that we usually hear about are from tech giants. On any given day, it seems that one of those companies steals the headlines. That’s a shame, because some of the most interesting companies are ones that rarely make headlines. They are often located in out of the way places or develop technologies behind the scenes, where their logo isn’t paraded in front of us on a daily basis. Nevertheless, they are important and do exciting work.

Why security metrics aren't helping prevent data loss
The survey appears to have found the disconnect --business speak versus IT speak. Business metrics that executives are familiar with tend to reflect strategic goals, prioritizing cost over less tangible security benefits. Where security metrics favor operational goals, and prioritize technical improvements over business contingencies.



Quote for the day:

"Absolute identity with one's cause is the first and great condition of successful leadership." -- Woodrow Wilson