December 02, 2013

Here comes a supercomputing app store
Supercomputer-based visualization and simulation tools could allow a company to create, test and prototype products in virtual environments. Couple this virtualization capability with a 3-D printer, and a company would revolutionize its manufacturing. But licensing fees for the software needed to simulate wind tunnels, ovens, welds and other processes are expensive, and the tools require large multicore systems and skilled engineers to use them.


Getting cloud capacity planning right in the face of oncoming growth
The tremendous revenue potential is driving virtually every hosting company and communications and IT solutions provider to invest in building out a cloud portfolio. The catch for providers is how and when to scale cloud infrastructure to meet increasing demand without overbuilding. Part art, part science, cloud capacity planning presents challenges to providers that need to figure in their own and their customers' needs.


Managing People on a Sinking Ship
When your business is facing declining sales, a potential buy-out, or even certain closure, how do you manage people who are likely panicking about their future? Can you keep your team’s motivation and productivity up? The short answer is yes: Even when it’s clear that a company’s in trouble, there are ways to help team members stay focused, deliver results, and weather the storm.


Benefits of a Windows Server 2012 R2 Core installation
"Common answers I get from folks when I ask why they haven’t adopted use of Server Core are: 1. I don’t have time to learn a new product/feature; 2. I don’t know how to use the CLI/Powershell; and 3. I’m not confident I could troubleshoot a Server Core box in an emergency type situation. While these are all valid concerns, they don’t merit the outright boycott of this new server deployment methodology."


BYOD's Achilles heel: Billing and losing group buying power
Employees get to use the device they want and the enterprise doesn't have to hand out smartphones anymore. But the returns on these plans have been sketchy. Why? No one has figured out proper billing arrangements. ... With BYOD plans what used to be a corporate expense winds up in an expense report or a stipend. What would be a large contract is splintered into many little consumer deals. More money could be spent on BYOD plans and tracked less than the good ol' days of corporate issued smartphones.


Why COOs are growing in importance
These objectives are, of course, integrated into the responsibilities of all board members and managers within their own areas, but a COO is able to put a specific emphasis and focus on quality and efficiency. At PGGM, we do that through a “lean” program that has the objective of, step by step, improving the processes within the company; I’m at the center of that. In my case, my targets are set very specifically according to these responsibilities – my most important goals are related to the lean program, and I also have targets relating to service levels, cost control and cost reduction.


High-Performance Transact-SQL with Window Functions
These functions are based on an amazingly profound concept in standard SQL (which is both an ISO and ANSI standard)—the concept of windowing. The idea behind this concept is to allow you to apply various calculations to a set, or window, of rows and return a single value. Window functions can help to solve a wide variety of querying tasks by helping you express set calculations more easily, intuitively, and efficiently than ever before.


Selling SaaS: Operational requirements for consumers vs. businesses
The key to successfully selling Software as a Service (SaaS) across all market segments is recognizing and addressing the different operational requirements among different buyer groups, which often stem from the value propositions that drive SaaS in the consumer, SMB and enterprise market segments. ... The bottom line is that the operations of all cloud services depend on effective management tools and good management visibility.


Google Nexus phones are vulnerable to attack via Flash SMS messages
On Google Nexus phones, when such a message is received, it gets displayed on top of all active windows and is surrounded by a semi-transparent black overlay that has a dimming effect on the rest of the screen. If the message is not saved or dismissed and a second message is received it gets placed on top of the first one and the dimming effect increases. When such messages are received, there is no audio notification, even if one is configured for regular incoming SMS messages.


The Subject and Discipline of Business Architecture
This article discusses the phenomena of Business Architecture considering both its subject and discipline. Without knowing the subject of Business Architecture, it is very difficult to justify the scope and extension of the role of a Business Architect, i.e. the discipline. Many Managers and Architects can say – “What’s the problem? By identifying stakeholders and collecting their viewpoints, one could essentially define a Business Architecture”. Unfortunately, this approach is the major fault that leads to many contradicting opinions about this subject.



Quote for the day:

"Nothing builds self-esteem and self-confidence like accomplishment." -- Thomas Carlyle

December 01, 2013

Microsoft's Software Licensing: Why I've Had Enough
It gets better, as Microsoft now offers "Licensing Training and Accreditation for Customers." In other words, if we invest even more time and money with Microsoft, it will bestow on us formal credentials saying we've mastered its convoluted licensing. At that point, can we then approve our own price proposal? We would be accredited, after all. No, all it would mean is that our arguments with Microsoft would continue longer than they do now. Much of the wasted time in recycling the same issue is due to a difference in opinion.


Governing the 'Internet of Things'
ISACA, an association that develops information systems and security practices and guidance, has issued a new study, Risks and Rewards of the Internet of Things, which shows that only 16 percent of Americans are familiar with the term Internet of Things. "People should be aware that the Internet of Things is coming into their lives and is going to be something that is an opportunity for them, to do things better, faster and cheaper," says Stroud, chair of ISACA's COBIT Growth Task Force. "And, also, on the converse side, it's going to be an area where they're going to have to watch some things like privacy issues. What's happening with their information and is their identity secure?"


How Green Is Your Network Cabling?
When cabling is being modified, or upgraded, care should be taken not to leave old trunking, and old cabling in place, unless it can be modified and updated. This is due to the fact that legacy cabling can cause obstruction and block airflow. There is also an added danger with leaving old cabling in place; it may not comply with the current “Reduction of Hazardous Substances” policy. Old-style cabling may release halogen if fire breaks out, leaving a company open to possible regulatory enforcement or fines.


Worm Targets Linux PCs and Embedded Devices
According to security researchers from Symantec, the malware spreads by exploiting a vulnerability in php-cgi, a component that allows PHP to run in the Common Gateway Interface (CGI) configuration. The vulnerability is tracked as CVE-2012-1823 and was patched in PHP 5.4.3 and PHP 5.3.13 in May 2012. The new worm, which was named Linux.Darlloz, is based on proof-of-concept code released in late October, the Symantec researchers said Wednesday in a blog post.


The death of the database
Many SAP (and other) customers will be running existing RDBMS systems for 20-30 years into the future, just as there are many people running 30-year old systems today. But they will be IT systems that businesses keep alive, whilst they innovate (and spend money) elsewhere. The real question is: will any of the existing incumbents have a place in the future? Hadoop and MongoDB are fast converging into the future, as is SAP, in my opinion, though from a very different direction. SAP has a different challenge, which is how its roots (internally and in its ecosystem) are embedded in the RDMBS market.


Social Network Analysis for Fraud Detection
As traditional techniques often fail to identify fraudulent behavior, social network analytics offers new insights in the propagation of fraud through a network - watch this short overview. This short overview of Social Network Analysis for Fraud Detection is presented by Veronique Van Vlasselaer, a student at KU Leuven, Belgium, working in the DataMiningApps group led by Prof. dr. Bart Baesens.


Increasing Oracle Database Availability with Fast-Start Failover
The key to this feature is a monitoring process appropriately named the Observer. The Observer is a component of the DGMGRL interface that is configured on a system outside the systems actually running the Oracle Data Guard configuration, which monitors the availability of the primary database. Should it detect that the primary database (all instances in an Oracle RAC environment) has become unavailable or a connection with the primary database is not able to be made, it will issue a failover after waiting the number of seconds specified by theFastStartFailoverThreshold property.


How To Achieve Data-Driven Design
Solution is to provide a Design driven methodology that helps businesses avoid severe and expensive design failures and set businesses on trajectory of consistent and sustainable improvements without busting the budget for the project. Solution is to give a rational methodology for figuring out how design is helping the business and learn from every interactions. Interaction could be triggered from manual or automated means. Knowledge gained could be used for iterating and improving upon specific experience related issues, without investing too much into fixing the entire design for small issues, which was how world used to do that.


Directing the Agile Organisation
At all levels, whether a team leader or CEO, an Agile Manager becomes responsible forfacilitating day-to-day operation, managing risk, providing governance oversight, and directing the strategic outcomes of the organisation. The key distinction is the act of facilitation, providing support to and removing impediments from their teams. Ultimately, by embracing and shaping change, an agile manager can position the organisation to quickly take advantage of new opportunities in the market.


A Balanced Score Card for presenting the value of Enterprise Architecture
Measuring the value of Enterprise architecture is not easy. In the presentation we will show an approach for measuring the value of EA by means of a Balanced Score Card (BSC). The BSC is a well-known management instrument for reporting value. We have developed a version of the BSC which is suitable to report the value of EA to management. In this presentation we will explain the EA BSC and show some preliminary results. If you leave your email address, then you will receive a PDF report with a compilation of the results.



Quote for the day:

"Everything's in the mind. That's where it all starts. Knowing what you want is the first step toward getting it. " -- Mae West

November 30, 2013

Emerging MDM Trends Part 3: MDM on Cloud
Running MDM on a Cloud is particularly interesting unlike other trends I discussed before because of challenges associated with cloud. Adoption of hosted services has always been infected with security issues. There has been increasing concern and demand for reliable and guarded platform and it is elementary when you think from organizations point of view. However, with MDM, this simple ask has become more demanding than ever before.


Cloud traffic to quadruple by 2017, challenge CIOs
Forrester principal analyst Dave Bartoletti said this means enterprises will have to rethink how they manage the growing cloud and Internet of Things. His colleague, Andre Kindness, said keeping files synchronized across multiple personal and enterprise devices will be one of the "things" that challenges companies in coming years. As the consumerization of IT drives employees to bring personal smartphones and tablets to work, the need to synchronize files is growing "from a whisper to a scream," Kindness said, noting that 21% of global information workers use file-sync solutions.


Reduce Your Stress in Two Minutes a Day
When he finished his second marathon a few minutes slower than his goal, he felt he had failed. So to make things “right” he ran another marathon just five weeks later. His body rejected this idea, and he finished an hour slower than before. Finally, his wife convinced him to figure out what was really driving his stress. He spent the next several years searching for ways to find more joy in the journey. In the process he found five tools.


Can technology improve business innovation?
For its part, the Internet itself has greatly accelerated general improvement in the field of innovation. By connecting millions of people with great ideas to new pools of resources that are able to help realize them, a pretty long list of impressive results have accumulated over the years. Of course, the darling these days in open innovation specifically is crowdfunding (which has led to the proverbial Cambrian explosion in related startups), where the concept is that anyone with a good idea can come to the community and try to convince them to fund their idea individually.


We’re ready for hybrid cloud, Microsoft Canada tells IT audience
That vision, however, doesn’t include building a data centre here for Microsoft’s hosted Azure infrastructure-and platform -as-a service (IaaS, PaaS) offerings, which compete against Amazon Web Services and others. Microsoft Azure has data centres in the U.S., Europe and Asia. Azure-based services here can only be bought from Canadian cloud providers using the Azure platform to offer IaaS and PaaS, Grant said in an interview.


Wibidata Machine Learning Platform Offers Comparable Capabilities
The new WibiEnterprise 3.0 platform allows a company to power a site with advanced analytics that fine-tunes itself, providing better recommendations and other features over time, including more relevant search results and personalized content. The platform is designed for the customer who is beginning to use data science, said Omer Trajman, vice president of field operations at Wibidata. “They are not classically trained but they have an analytics background. They have been doing marketing analytics. The mechanics are similar, what has changed is the availability of data.”


Here comes a supercomputing app store
Supercomputer-based visualization and simulation tools could allow a company to create, test and prototype products in virtual environments. Couple this virtualization capability with a 3-D printer, and a company would revolutionize its manufacturing. But licensing fees for the software needed to simulate wind tunnels, ovens, welds and other processes are expensive, and the tools require large multicore systems and skilled engineers to use them.


How to Start Thinking Like a Data Scientist
Fortunately, you don’t have to be a data scientist or a Bayesian statistician to tease useful insights from data. This post explores an exercise I’ve used for 20 years to help those with an open mind (and a pencil, paper, and calculator) get started. One post won’t make you data savvy, but it will help you become data literate, open your eyes to the millions of small data opportunities, and enable you work a bit more effectively with data scientists, analytics, and all things quantitative.


Scrap your ITSM Processes
Now, as with every service, there are other stakeholders other than the customers. Laws, regulations and policies still apply. But the message we need to bring to the customers is that we can make your life better – the service we deliver will help you get your job done. Will the underlying process change? Probably not much – if at all. But the marketing will, and the relationship with the customers will. And the vision of the (now) Service Owner will influence the mindsets of all the other roles within the service.


Is Your Leadership Like No Place On Earth?
The deepest questions, insights, awareness and answers rarely come to us as leaders or managers when we are sitting at the top of the mountain of success feeling like the keys to the universe are all ours. No matter who we are, no matter what we have captured or accomplished; our success, achievement, sense of personal power, value or fulfilment can always change in a blink of an eye. We must constantly strive to keep on top of our goals. The greatest power we hold is not in what we have, but in who we truly are when we choose to ignite, engage and unleash the leader we want our team to follow.



Quote for the day:

"There was never a genius without a tincture of madness." -- Aristotle

November 29, 2013

Agility, Big Data, and Analytics
Agile hinges on embracing and adapting to change by enabling rapid feedback cycles and evolutionary development. However, bringing agility into big data (and small data) analytics has been a challenge for many, very bright and talented, data scientists and engineers. In this article we’ll explore what makes analytics uniquely different than application development, and how to adapt agile principles and practices to the nuances of analytics.


Structuring a big data strategy
IT executives first need to formulate a clear business case and execution strategy. Without those elements in place, any effort put forth to gather, classify, analyze and ultimately act on data might be for naught.  This essential guide prepares business and IT executives for success by showing how their peers have made the business case for big data and rolled out a big data strategy in their organizations. Learn the tools, technologies and strategies used to turn big data into big business insights.


Flash Startup Pure Storage Fights EMC in Trade-secrets Battle
The fight has exposed competitive tensions surrounding all-flash arrays, which are expected to play a growing role in data centers as enterprises seek faster data access and more efficient storage platforms. Pure is a specialist in all-flash gear that started shipping in 2011, while the venerable EMC is aggressively pursuing the market through its acquired XtremIO division.


Call-Log App Aims to Reverse-Engineer NSA Surveillance
The NSA was revealed to routinely collect such logs from Verizon in some of the first documents leaked by erstwhile intelligence agency contractor Edward Snowden this year Other companies are believed to be under similar obligations. Those logs include what the NSA calls “metadata”—the time, duration, and source and origin numbers of every call. The agency says it searches its metadata collection only for specific phone numbers related to investigations, but opponents of the program claim that, with careful analysis, the database could be used to reveal personal details on a vast scale.


Is The UK Sleepwalking Towards Internet Censorship?
Schmidt was basing his prediction on improvements in encryption. Google, along with Facebook, Yahoo and, today, Microsoft have all announced major improvements in security following the recent revelations from former NSA contractor Edward Snowden about government spying. “We have strengthened our systems remarkably as a result of the most recent events,” Schmidt said. “It’s reasonable to expect that the industry as a whole will continue to strengthen these systems.”


Consumer cloud services: Friend or foe?
IT pros have valid concerns about data leaking from the cloud, but in the grand scheme of things, a data leak is only as earth-shattering as the information that leaks. If the information that gets out via a cloud hack or employee carelessness isn't mission-critical, then it stands to reason that it doesn't matter much that it's been made public. If you can get past the security concerns, allowing the use of consumer cloud services -- such as Dropbox and Google Drive -- means that IT doesn't have to manage an in-house service.


Building a RESTful Web Service with Spring Boot to Access Data in an Aerospike Cluster
Spring Boot is a powerful jump start into Spring. It allows you to build Spring based applications with little effort on your part.Aerospike is a distributed and replicated in-memory database optimized to use both DRAM and native flash/SSDs. Aerospike also has high reliability and is ACID compliant. Developers can quickly scale their database cluster from two nodes to twenty nodes without bringing down the database service.


IT group slams Chinese govt for not doing enough
Describing Beijing's efforts toward IT development as "insincere", Witman Hung Wai-Ma, chairman of Internet Professional Association (iProA), said the industry's prospects had become so dire that the group felt it necessary to speak out against the government, according to a report Friday on South China Morning Post. Hung is also co-founder of Next Horizon, which provides backoffice process outsourcing.


Google privacy changes break Dutch data protection law, says regulator
The report said it was "almost impossible" for a Dutch internet user not to interact with Google "be it via Search, YouTube or Maps, or passively through third-party websites" and that "Google does not properly inform users which personal data the company collects and combines, and for what purposes." It also said that proper user permission "cannot be obtained by [their] accepting general (privacy) terms of service."


Magnetic tape to the rescue
WHEN physicists switch on the Large Hadron Collider (LHC), between three and six gigabytes of data spew out of it every second. That is, admittedly, an extreme example. But the flow of data from smaller sources than CERN, the European particle-research organisation outside Geneva that runs the LHC, is also growing inexorably. At the moment it is doubling every two years. These data need to be stored. The need for mass storage is reviving a technology which, only a few years ago, seemed destined for the scrapheap: magnetic tape



Quote for the day:

"I've got a theory that if you give 100% all of the time, somehow things will work out in the end." - Larry Bird


November 28, 2013

Consumer cloud-based storage services force changes in security
The perceived superiority of consumer cloud-based storage services may reflect a lack of policy controls and not a difference in core functionality. For example, an internal document management system may have features such as device-independent access. It might seem less user-friendly because a user cannot simply provide a list of collaborator email addresses to share a folder with others.


How the cloud’s value proposition is changing
Since 2010 a new value proposition has taken shape — one that I feel truly realizes the full power and original intent of the modern cloud. Today, the value proposition of the cloud comes from the ability to connect disparate applications to form one seamless web of IT. In a 100 percent web environment, APIs from dozens of applications can be integrated to allow data to flow across systems.


Screen play thoughts: A speculative look at trends in video game addiction
Over the last decade there has been a significant increase in the number of scientific studies examining various aspects of video game addiction. This has resulted in a wide-ranging selection of review papers focusing on different aspects of the topic. These include general literature reviews of video game addiction, reviews of online (as opposed to offline) gaming addiction, reviews of the main methodological issues ...


Resurrecting the Failed Project - Part 2
Finally, we had a modified project kick-off meeting. Nothing big, nothing very formal. But it was a chance for us to once again discuss next steps, assumptions, risks, issues and lessons learned, and to review the project schedule so we all left on the same page and ready for the next phases and the next deliverables we would be focused on. This step is critical…because while it's not a formal kick-off meeting you have to remember you're dealing with an organisation that somehow decided to give your organisation a second chance.


To Strengthen Your Attention Span, Stop Overtaxing It
Top performance requires full focus, and sustaining focused attention consumes energy – more technically, your brain exhausts its fuel, glucose. Without rest, our brains grow more depleted. The signs of a brain running on empty include, for instance, distractedness, irritability, fatigue, and finding yourself checking Facebook when you should be doing your work.


XtremIO: What You Need to Know (Updated)
The controllers each have two 8Gb/s Fibre Channel ports, Two 10GbE iSCSI ports, two 40Gb/s Infiniband ports (for node communications) and one 1Gb/s management port. In terms of capacity, todays’s XtremIO solution scales from a single X-Brick with 10TB of capacity (7.5TB usable) to four X-Bricks of 30TB usable. A capacity increase is expected in 1Q2014 with double capacity SSDs offering up to 60TB in a single four-node cluster. Eight-node clusters are also being talked about, but I have no timescale for that.


WSO2 Big Data Story
WSO2’s Big Data Analytics platform captures business activity across multiple data formats and message channels, performs temporal complex event processing and map-reduce analytics, and presents relevant, real-time business alerts and dashboards to enable timely operational management and business planning. WSO2 Big Data Analytics Platform enables an API-centric architecture, enhances business visibility, Contextual Web, and helps build an adaptive business.


The Care and Feeding of Data Scientists
"I'm coaching them to make sure they're aligned with the company, but I'm not prescribing methodology," says Anne Robinson, director of supply chain strategy and analytics at Verizon Wireless. "Because if you want a high return on your analytical investment, allow them the freedom to explore." Robinson says good teams incorporate a mix of academic skills and applied experiences. Personal characteristics, such as the ability to make connections and express ideas well, are important in the corporate setting, managers say.


Researchers enable computers to teach themselves common sense
The program also is set up to enable a computer to make common sense associations, like buildings are vertical instead of lying on their sides, people eat food, and cars are found on roads. All the things that people take for granted, the computers now are learning without being told. "People don't always know how or what to teach computers," said Abhinav Shrivastava, a robotics Ph.D. student at CMU and a lead researcher on the program. "But humans are good at telling computers when they are wrong."


Bluelock CTO: Learn which benefits of IaaS matter most to customers
As competition in Infrastructure as a Service (IaaS) intensifies and more players enter the market, customers won't think twice about abandoning their current cloud provider if it disappoints them. Now more than ever, providers need to not only understand what enterprises are looking for in an IaaS provider, but they also need to know which benefits of IaaS resonate the most with customers.



Quote for the day:

"I am reminded how hollow the label of leadership sometimes is and how heroic followership can be." -- Warren Bennis