August 01, 2013

Understanding IT's role in cloud security and compliance
In this chapter excerpt from Cloud Computing: Assessing the Risks, authors Jared Carstensen, Bernard Golden and J.P. Morgenthal discuss what cloud consumers need to consider in terms of security, compliance and risk, how these considerations affect cloud infrastructure and applications, as well as where the compliance responsibility -- or trust boundary -- lies.


Ask these 9 questions to avoid hero worship and closed minds
Failure is essential to the human experience; we would not be able to define success without it, nor would be we be able to learn and grow if there was nothing we were shallow, ignorant or inexperienced about. And, in theory, corporate America gets this. We talk about innovation by failing fast, of developing employees by letting them make mistakes and overcome them. But do we live this or simply say it?


Secure migration to the cloud: A not impossible mission
A challenge with many of these approaches is that they are not always scalable for enterprise use: different administrators are managing passwords, SSH key pairs, and so on. You may have one solution for securing your data at rest in the cloud, one for backups and another for data migration. Got a headache yet?


Cloud contracts poor on security, says Gartner
“As more buyers demand it, and as the standards mature, it will become increasingly common practice to perform assessments in a variety of ways, including reviewing responses to a questionnaire, reviewing third-party audit statements, conducting on-site audits and/or monitoring the cloud services provider,” said Bona. ... “We recommend they also include recovery time and recovery point objectives and data integrity measures in the service level agreements, with meaningful penalties if these are missed,” she said.


Tech Trajectories: Four More Moore’s Laws
We’re all familiar with Moore’s Law, which takes an inexorable view of technological progress, with the number of components on an integrated circuit doubling like clockwork every 18 months or so. But do other technologies follow a similar pattern of exponential improvement? ... Moore’s Law–like doubling serves as a fair predictor of progress, but not without hiccups.


What to look for in Linux memory usage
Unlike Windows, where memory swap can slow programs down, Linux memory swap is advantageous, thanks to the way in which Linux analyzes processes' allocated memory page use. The Linux kernel runs a Least Recently Used algorithm to determine which memory pages need to be in RAM and which do not. In some cases, letting the Linux kernel swap faster can improve memory performance.


How the cloud is going to reinvent ERP — and how long it will take
Not that the cloud is going to banish the core of on-premise ERP. "For the next five years or more we will see the deployment of what we call hybrid-ERP, a mix of on-premise and the cloud", Rayner said. "What we do know is that there will be come occasions when on-premises ERP is the way to go and some where the cloud is better suited."


Making the Shift from Sustainable to Transient Advantage
In traditional strategy, companies define their most important competitors as other companies within the same industry. And that worked very well in an era where most sectors of the economy were dominated by a few big players; if you're an oil company, for example, you compete with other oil companies. If you're a car company, you compete with other car companies. But that is a dangerous way to think about competition. Boundaries between industries are no longer so clear-cut.


Software-defined everything: Revolution or evolution?
It is easy to get caught up in the hype cycle and believe the buzz about the benefits of new technologies. Software-defined solutions certainly hold a lot of promise -- an automated, dynamic infrastructure, business-aligned SLAs, simpler operations and lower costs. But, technology shifts like this don’t come without risks or unintended consequences that we -- as an industry and individual companies -- will need to manage.


A Way to Drive 'Dual Transformation'
One way to make the case for change is to highlight early warning signs that disruption is taking root. Disruption typically starts innocently, with a lower-cost or simpler solution taking root among undemanding customer groups, or among people whose lack of expert skills or sufficient wealth kept them out of the market. The pattern of disruption means that these humble beginnings can lead to cataclysmic change, so even the smallest development should be watched carefully.



Quote for the day

"Be less curious about people and more curious about ideas." -- Marie Curie

July 31, 2013

Healthcare and technology: How J&J Pharma CIO keeps them in sync
In this first part of a two-part CIO Innovators Profile video shot at the MIT Sloan CIO Symposium event in Cambridge, Mass., Papathomas shares with Tech Target's Christina Torode how technology is creating new products and services for J&J Pharma and how IT must earn the right to be a trusted partner to the business.


Project Management: Do Less by Committing to More
Adaptation to project reprioritization does not affect projects that are already underway. Because business and management stakeholders are involved in the prioritization process, there are no surprises about the program schedule. Everyone also understands that the program backlog is always evolving based on the changing needs of the business.


How Intel Plans to Destroy the Legacy Data Center
Intel, to its credit, eventually came around and has been working furiously to create a high-efficiency platform based on Atom. Companies such as Facebook are flocking to it; they say it provides the best capacity, lowest operating costs and highest efficiency for Internet service loads. (Internet services are still the fastest-growing opportunity for this class of device.)


PRISM turned up the volume on cloud security conversations
The conversation about cloud security got more interesting following revelations on the National Security Agency’s PRISM program, even if many people figured that such government snooping was possible if not already happening. After talking with executives at a few cloud providers, it sounds like the PRISM news hasn’t necessarily lowered inquiries about public cloud services. What it is has done is prompt more questions about security.


DDoS attacks getting bigger but shorter in duration
Not only do they attack multiple sites, but they don't prolong an attack if they don't see immediate results. "They'll move from target to target after 10 or 20 minutes until they find one they can cause an immediate impact on," Smith noted. Attacks are becoming bigger because hackers have more resources to mount attacks than ever before, said Marc Gaffan, founder of Incapsula.


Spoofed! Fake GPS signals lead yacht astray
"We mimicked the entire GPS constellation," said Todd Humphreys, a researcher at the university's department of aerospace engineering and engineering mechanics. "We had a counterpart for each signal coming down from every satellite in the sky. When they mixed together with legitimate signals in the receiver, ours were slightly stronger," he said in an interview.


Reengineering a CRM strategy for the age of the customer
CRM leaders need to take a systematic approach to understanding the business drivers that affect the organization; this sets the context for the CRM strategy. Forrester defines business drivers as the "evolving customer, competitor, and technology trends that collectively act as an environmental force driving your company to evaluate and hone its CRM strategy and practices."


4 Ways To Build Your 'Executive Presence'
People judge a company by its leader. “Women [and men] who have ‘it’ have discovered the right formula of conveying their business expertise using a combination of competence — business knowledge — and warmth — their ability to connect with others,” said Rosina Racioppi, President and CEO of WOMEN Unlimited, which trains talented women to develop needed skills and mindset shifts to become leaders.


Microsoft relinquishes SkyDrive brand
According to the settlement, Microsoft will not pursue its planned appeal of this decision and Sky will allow Microsoft to continue using the SkyDrive name for a reasonable period of time to allow for an orderly transition to a new brand. The agreement also contains financial and other terms, the details of which are confidential.



Quote for the day:

"My troubles and obstacles, have strengthened me... a kick in the teeth may be the best thing in the world for you." -- Walt Disney

July 30, 2013

Are Conditions Right for a Chief Data Officer?
If we substitute "information" for "money", we have roughly similar picture. Everyone gathers it. Everyone uses it. But who is looking out for the big picture? Making sure that the information assets are working as hard as possible, that value is safeguarded, that it's being used appropriately? ... we're in the early days of business leaders starting to take their information assets very seriously: maximizing value, avoiding risks and safeguarding information assets.


Encrypting Backup Data for HIPAA and PCI Compliance
Stored data is a top target by hackers, especially the type of data that can be used for fraud and medical identity theft – within the healthcare industry in particular, encrypting stored data to meet HIPAA compliance is one way to avoid the HIPAA Breach Notification Rule and keep data secure.


Is the CMO now the Chief API Officer?
While the CIO budget is shrinking, the CMO budget is bulging. Often, I see instances where a CIO will go to the CMO for help and have them write the check. The CMO has become the king of IT without you knowing it. It helps them to track everything their potential customers are doing. Often they are now responsible for analysis and identifying emerging trends – which of course they can leverage for more effective campaigns.


IT Governance: Way to Succeed
“Given the growing complexity of the CIO role, the future CIO may find that appointing a CTO or a deputy is necessary. The deputy focuses on “keeping the lights on” - this will enable the CIO to capture opportunities that are advantageous to the organisation by strengthening the stage and supporting the management in advancing new ways of thinking and operating.”


Enabling Microservice Architectures with Scala
Kevin Scaldeferri, reports on using Scala for an SBT plug-in, for unit and functional testing, type-safe shared configuration using Zookeeper, and live inventory with WebSocket and Akka Actors. ... He has spoken at OSCON, YAPC, several user groups, and given internal tech talks on a variety of topics such as "How to Serve a Billion Requests a Day with Perl", "Beautiful Concurrency with Erlang", SBT, and more.


What cloud bursting and disaster recovery mean for hybrid cloud
Clearly, cloud bursting represents a more agile approach for a disaster strategy. If growth in an application's workload can trigger cloud bursting, a reduction in available resources to the application -- server or even data center failure -- could also trigger it. This DR strategy could deal with not only a complete data center failure but also limited equipment, software or even network failures.


Cybercrime 'bigger threat than nuclear war', UK lawmakers say
Committee Chair and MP Keith Vaz said:  "We are not winning the war on online criminal activity. We are being too complacent about these E-wars because the victims are hidden in cyberspace. The threat of a cyber attack to the U.K. is so serious it is marked as a higher threat than a nuclear attack."


The Center of Analytics Success Takes on Communication Skills
An analyst at a global advisory firm says that communication skills are an “area for improvement” for CIOs—especially for individuals who want to “help lead the transformation of their companies." And another study found that 41% of survey respondents suggested communication skills were even more important than technical skills to ensure IT success!


Why Commenting Code Is Still a Bad Idea
To make life easier for the next developer, code should be written and rewritten to be as obvious as possible. What's left for comments to do is explain what the compiler doesn't have access to: why the code is there. Adding comments to explain how your code does its job -- which (I think) some readers were recommending -- is not the solution. It's just adding more cost.


The Countdown Begins: Support for Windows XP Ends on April 8, 2014
Computers running Windows XP routinely experience a significantly higher malware infection rate than computers running any other supported version of Windows. Much of the elevated infection rate on Windows XP can be attributed to the fact that some of the key built-in security features included with more recent versions of Windows are not present in Windows XP.



Quote for the day:

"You have to think anyway, so why not think big?" -- Donald Trump

July 29, 2013

New virtual networking technologies make convergence real
The fact that there are three distinct SDN models shouldn't discourage advocates of virtualization-based convergence. All three models offer improved Network as a Service capabilities, even though they differ in whether they focus on segmenting connectivity for the isolation of tenants and applications, or managing network traffic.


New Zealand updates cloud code of practice as ACS looks on
The code has two key tenets. The first is not calling the offering "cloud computing" unless it actually is. Cloud computing is defined in the code as: "On-demand scalable resources, such as networks, servers, and applications, which are provided as a service, are accessible by the end user and can be rapidly provisioned and released with minimal effort or service provider interaction."


Feds Move To Open Source Databases Pressures Oracle
"The traditional, burdensome licensing practices of the big proprietary guys have really started to put new kinds of pressure on government agencies," he said. "Most of the licensing firms have come up with very inventive ways to make sure the price per year goes up and not down, and that's in direct conflict with the way government agencies are trying to operate now."


Quick Tips: Breaking Bad Employee Habits
Being motivated is key to high productivity, and 47% of employers value it as the most critical trait. If you have an unmotivated worker, his or her bad habits of showing up late to meetings, not being actively involved in brainstorming sessions, or not coming up with new, innovative ways to help the company may be resolved by teaming them up with one of your top performers.


How Android’s new App Ops controls could encourage privacy by design
It looks like the latest version of Android has an interesting little feature tucked away: granular controls for app permissions. The Android 4.3 feature, called “App Ops”, has just been flagged up by Android Police on Friday, and it looks like it could be a game-changer when it comes to privacy. ... For many developers, however, it could prove an utter nightmare. In the quest for privacy or longer battery life, many users may turn off bits of functionality then later wonder why those elements of the app don’t work.


Global worker communities emerge as Amcor thinks outside the box
“It’s a very decentralised business model that’s focused very much on business groups, which are all based in different countries and on different products,” corporate communications manager Zed Ivankovic said at an IBM social-business event in Melbourne. “From a technical point of view, we’ve found challenges around really simple things that you take for granted when you’re working in a one-site environment – things like sharing files, collaborating on files, and that sort of thing.”


How to improve network performance via advanced NIC options
Most NICs support jumbo frames, which means handling packets, or frames, of up to 9,000 bytes. Jumbo frames contain more data in each packet, so fewer packets are needed to convey data across the network. Throughput improves with less overhead -- packet headers and other packet content -- and CPU overhead shrinks.


How Rackspace hires admins: Textbook questions vs. break-fix challenges
But Walsh said if a candidate doesn't get a strong score on the online test, that doesn't necessarily exclude them from a job. An interview may reveal that a candidate who didn't do well on the test, is "a really solid systems administrator at a pretty high level," said Walsh. ... "We need people who can easily talk through situations with customers, as well as log-in and actually do the work," said Walsh.


Five Forces of Collaboration in a 24/7 Globalized World
Hardly a day passes without reference to today’s “globalized world” or its “borderless markets” as the justification for a particular business strategy. This type of connectedness plays a big part in building and extending a collaborative ecosystem that spans teams, departments and geographies. But to fully immerse a business in a connected, collaborative environment, it’s important to first understand what exactly connectedness is.


What to look for in a software engineering culture
Using the Mondrian tool at Google, we had a very clear code review process, where a changelist could not actually be submitted until the reviewer gave the "approval." Using Github's more lightweight code reviews at Coursera, we've had to come up with our own conventions on top of it, where the reviewer will say "Merge when ready" when they're happy or the reviewee will say "Please take another look" if they want a second review.



Quote for the day:

"Satisfaction lies in the effort, not in the attainment. Full effort is full victory. " -- Mohandas Gandhi

July 28, 2013

Gamification is the best way to engage consumers say experts
David Smith, ceo of The GFF, reveals that gamification is being used in both the public and private sector, including government. “Changing the way we interact rather than being prescriptive to being playful and game means we’re being encouraged to do the right thing rather than being forced to do the right thing. It’s a very positive thing if used well.” “San Francisco has gamified the idea of speed control,” Smith explains.


Internet Traffic Jams, Meet Your Robot Nemesis
Remy is not designed to run on individual PCs and servers, but someday it may be used to develop better algorithms to run on those systems, said Hari Balakrishnan, the Fujitsu professor in Electrical Engineering and Computer Science at MIT. For now, it's churning out millions of possible algorithms and testing them against simulated networks to find the best possible one for a given objective.


How do you build the right thing?
This eBook, first in a series of three, tries to answer the question “Where did the design phase go?” It collects a series of essays from ThoughtWorks designers around the world who are addressing product design challenges head-on by fusing agile development practices with the disciplines of interaction design.


IBM’s Big Data University Gears Up to Meet Enterprise Demand
IBM is committed to big data because we see the value of big data in every industry. Our goal is to enable the customers to really own their businesses. Not just teaching them how to program, but take them through the technology and its capabilities in the context of the applications and use cases. ... The correct mindset is to be open, bring creativity, do an exploration of the data. There is technology available to explore that data quickly and cost-effectively. That fear factor has to away.


3 Ways to Build Leadership Credibility in Tough Times
The America’s Workforce survey delivered some meaningful insights on areas leaders can focus on to build leadership credibility and lead more effectively. After all, we can keep talking about what is not right or we can focus on what we know we can do to make a difference. The survey results suggest that top leaders do three things effectively in successful organizations.


How to find on-demand expertise using crowdsourcing
Developing reputation systems is challenging. Although LinkedIn leads in terms of access to finding and connecting to professionals, the task of evaluation still falls to clients. But an expanding universe of smaller marketplaces, crowds, and communities provides not only connections but also evaluation in the form of reputation systems.


A New Breed of CFO
“Thinking about the ‘new breed’ of CFO, the analytical piece is a big differentiator and a reason I was chosen for this role over other candidates,” says Hightail’s Sizer, 47. “Folks like me are in high demand today to solve a data problem.” That is, most companies, but especially online technology companies, have massive amounts of data and must figure out how to use it to drive business performance improvements.


How To Help Top Talent Thrive
The smartest people often have unconventional expectations. They’re likely to assume managers don’t understand what they are doing, but they want respect for what they do. They want managers to recognize their ideas, and reward them with access to corporate leadership, information and resources. They want freedom to explore new territory, and permission to fail, because failure ultimately can lead to better outcomes.


Does anyone in IT truly relax on vacation?
Brian Kelley, the CIO of Portage County IT Services in Ravenna, Ohio, said, "Work will always impede upon my vacations to some degree." Similar to de Lima, Kelley says that checking on things makes the return from vacation easier. "By managing some work while on vacation, I can rest assured that when I return to work catching up will not be a major headache nor require that I put in long days to do so," he said.



Quote for the day:

"To have long term success as a coach or in any position of leadership, you have to be obsessed in some way." -- Pat Riley