December 17, 2013

Oregon health exchange technology troubles run deep due to mismanagement, early decisions
The deadline to create a functioning exchange was always tight. Federal requirements repeatedly changed or were issued at the last minute. And the project was no simple task, requiring a site that interacted securely with state and federal agencies, tribes and a dozen insurance carriers. But questionable management moves by the state and Cover Oregon also played an undeniable role.


How Strategic Agility Can Lead to Denial
You know what it’s like on the field of play. (Some of you even know what it’s like on the field of battle.) Once things have started to come undone, it’s very hard to think clearly. It feels like the sky is falling. I know this from my own undistinguished career as a high school quarterback. (I remember thinking about one chaos-raining cornerback, why don’t we just make this guy a permanent part of our backfield.) It’s hard to think at all, let alone strategically. Now it’s all damage control, all the time. Now, it all denial, all the time.


IBM reveals its top five innovation predictions for the next five years
“We try to get a sense of where the world is going because that focuses where we put our efforts,” Meyerson said. “The harder part is nailing down what you want to focus on. Unless you stick your neck out and say this is where the world is going, it’s hard to you can turn around and say you will get there first. These are seminal shifts. We want to be there, enabling them.”


State of the CSO in 2013 shows an improved outlook
Not surprisingly, considering the number of enterprises with budgets on the rise, staffing levels are also expected to grow. Fully 34 percent of respondents expect their organizations' full-time security headcount to increase. Also, fewer expect to cut full-time security staff this year—only 8 percent compared to 14 percent last year. Once again, it is the larger companies that are most likely to be increasing their security resources, with 42 percent planning staffing increases, compared to 37 percent of midsize and 26 percent of small organizations.


Wal-Mart CIO's Advice For Women In IT
A mentor is somebody who stays with you over a long time. You have that trusting investment in each other. The sponsor is key for any talent to have. They will speak on your behalf in a compelling way. There's no messiness. A sponsor doesn’t worry about being second-guessed. Their credibility in their peer group is a really powerful counter-effect on subliminal bias in an organization. The sponsor can say "Why can’t she?"


CIO role in innovation begins with foresight
Too often, operations acts as a black hole, and IT gets sucked into it and that's where we spend all of our time: in the back office, keeping things up and running. If we outsource that, then we can truly spend that time getting aligned with the business, understanding the business, and helping the business to grow and to become more profitable.


CIOs: Be aware of the ever-increasing IT table stakes
Like differing table stakes, businesses and markets all have different expectations for technology. It's a given at a manufacturing company that the CIO has a firm grasp of ERP systems, but perhaps the stakes are lower when it comes to marketing automation and CRM software. While this is fairly obvious, one of the dangers I've noticed in IT leaders is not observing how table stakes are increasing around them, while they maintain the status quo in their own organization.


Exposing CQRS Through a RESTful API
Command Query Responsibility Segregation (CQRS) is an architectural pattern proposed by Greg Young that segregates reads (queries) and writes (commands) of a system into two separate subsystems. Commands are usually asynchronous and stored in a transactional storage while reads are eventually consistent and retrieved from de-normalised views. This article proposes and demonstrates an approach for building a RESTful API on top of CQRS systems.


Service Providers light up the Cloud OS
The members of the Cloud OS Network are leading service providers who will offer hybrid services that give customers greater flexibility and choice. By making a substantial commitment to the Microsoft Cloud Platform, they are able to deliver tailored infrastructure and application services that meet diverse customer needs. Customers will have greater choice in customization, data sovereignty, security, privacy and service levels.

 Scaling Agile development calls for defined practices, consultant says
Some Agile software developers say that a predefined development process like Scaled Agile Framework (SAFe) is a departure from, not an extension of, the Agile methodology. Agile, they say, is about adapting to change and letting processes emerge. That approach can work well in small Agile projects, said Agile consultant and practitioner Mike Bonamassa. When he has done large development projects, practicing the Agile methodology without structure hasn't worked well.



Quote for the day:

"Make no small plans for they have not the power to stir men's blood." -- Niccolo Machiavelli

December 16, 2013

For most, tablets do not make good full-time laptops
What it won't (and can't) do is become a primary PC that meets all my needs. Like virtually every hybrid out there, the lack of a full complement of ports, the small display, and the under-sized keyboard, will not have the versatility that I require to have it serve as my only computer. I believe that is true for most folks, including many of those searching for a single hybrid device to meet all of their computing needs. I don't think there is, nor will there ever be, a single device that can be my only computer.


Is Business Agility a Product of Top-Down or Bottom-Up Resource Allocation?
Making a similar argument, Gerald Nanninga said, "Much of the new growth will come from new ventures which reapply core skills in new ways. These usually fall in the cracks between the status quo business units. Unless a corporate center reallocates resources to go after those 'cracks', they will be missed." At the end of the day, he wrote, "most investors are looking at total cash flow return on total investment. An agile corporate center can better focus on getting the total right."


SOA for Process and Data Integration
Traditionally, BI has been a process-free zone. Decision makers are such free thinkers that suggesting their methods of working can be defined by some stogy process is generally met with sneers of derision. Or worse. BI vendors and developers have largely acquiesced; the only place you see process mentioned is in data integration, where activity flow diagrams abound to define the steps needed to populate the data warehouse and marts.


Why few want to be the CIO anymore
Yet there's another reason for this shift in career thinking. Technology professionals are being recruited to work in marketing, logistics and other functions outside of IT as technology becomes more deeply embedded in virtually every aspect of the business. That trend is expanding the IT career path horizontally. Rather than one career ladder with CIO at the top rung, there are increasingly multiple career bridges across organizations.


Tech Bubble Is Stable for Cybersecurity Companies
The business of cybersecurity likely will see more stable growth thanks to this demand, but the money does not come as quickly compared to consumer-targeted websites because the technology behind cybersecurity is more complicated than social media, Ackerman explains. "If you want to get into the space because you think cybersecurity is hot but you don't have a deep background in this area, the chances to make a serious mistake by investing in a company or starting a company are magnified," Ackerman says.


The Evolution of ETL
Now, the majority of the data created is machine generated, collected in application logs and produced by sensors. The verbosity and sampling rate of these sources has exploded as computing capacity has expanded, storage has become cheaper and the business value of this data has increased. To meet these extreme challenges, a new breed of platforms has been developed including Hadoop, a wide range of NoSQL stores and cloud-enabled infrastructure.


The Best Way for New Leaders to Build Trust
Without trust, it is very unlikely you will learn the truth on what is really going on in that organization and in the market place. Without trust, employees won’t level with you—at best, you’ll learn either non-truths or part truths. I see this all too frequently. Sometimes employees will go out of their way to hoard and distort the truth. The best way to start building trust to take the time and meet as many individual contributors as you can as soon as you can. In addition to meeting customers, meeting rank-and-file employees should be your top priority.


Implementing CEBP in the enterprise
Communications-enabled business processes (CEBP) streamline existing processes within an enterprise. In part one of this Q&A, Davide Petramala, executive vice president of business development and sales at Esna Technologies Inc., goes over the basics of communications-enabled business processes. In part two, Petramala explains how enterprises can determine whether they should adopt CEBP, who is responsible for implementing CEBP and how to determine cost savings.


What employers want from enterprise architects
The market for talented EAs is thriving, and demand has never been better. EA as a profession has really come of age since it emerged alongside service oriented architecture and Agile practices in the mid-2000s. Here are some snapshots from recent job listings culled from the Dice recruiting site. What do they all have in common? They all call for a role in bridging the technology and business sides of their respective organizations.


IT pros get training on their own dime
"I just kept doing it on my own because I wanted to advance, but also this is what IT people need to do to stay employed. Everything changes so fast, you can't not stay in the education stream," says Bubbers, now a senior network administrator at Craig Technologies, an IT and engineering services provider in Cape Canaveral, Fla. Bubbers is hardly alone in her approach. IT spending may be on the rise, but training budgets aren't increasing at the same pace.



Quote for the day:

"A year from now you may wish you had started today." -- Karen Lamb

December 15, 2013

Exploring the Influence of Finjan's Proactive Content Security
"We realized there had to be a better solution for anti-virus software," said Phil Hartstein, president of Finjan. "The notion at the time was to spend so much time on matching signatures." Aside from the fact that the signature-based approach only defends from what is already known, Hartstein also pointed out how expensive and resource-consuming the process was. "So we thought, 'Maybe there's a better way,'" he said. "Instead of matching signatures, let's identify the behavior."


Will Advanced AI Be Our Final Invention?
Technological innovation always runs far ahead of stewardship. Look at nuclear fission. Splitting the atom started out as a way to get free energy, so why did the world first learn about fission at Hiroshima? Similarly, Barrat argues, advanced AI is already being weaponized, and it is AI data mining tools that have given the NSA such awesome powers of surveillance and creepiness. In the next decades, when cognitive architectures far more advanced than IBM’s Watson achieve human level intelligence, watch out —“Skynet!” No, seriously.


5 Signs You Have High Emotional Intelligence
Thankfully, it appears that it is. "Whereas IQ is very hard to change, EQ can increase with deliberate practice and training," Dr Tomas Chamorro-Premuzic, a professor of Business Psychology at University College London explained earlier this year on the HBR Blogs. "The most important aspect of effective EQ-coaching is giving people accurate feedback. Most of us are generally unaware of how others see us," he added.


Demystifying 4 myths around PaaS
The last year has been a whirlwind in the Platform as a Service (PaaS) space. Traditional middleware vendors finally released long-awaited offerings. Some early PaaS players, like Google and Microsoft, have since exposed Infrastructure-as-a-Service (IaaS) offerings directly. And traditional hosting providers like CenturyLink (s ctl), have realized that PaaS helps them connect with developers. There is clearly still a lot of PaaS learning going on, and it’s very difficult for those not embedded in all-things-cloud to figure it all out. With that in mind, here are some major myths we’ve encountered in the PaaS market.


Automation – Orchestrator Back to Basics – Use Cases Spotlight (1 of 5)
Who knows, your CIO might be asking you what the fuss is all about and what the benefits would be. So, in general, automation achieves the following: Integrate silo’ed environments and processes together, leading to more agility, service delivery performance and reliability; Automate recurring manual tasks : This helps minimize costs, lets operations teams focus on more valuable and sometimes more interesting tasks; and Standardize and document processes : The combination of technology integration and manual tasks reduction helps standardize processes


Enterprise Architecture as Story
Your stakeholders need change, but they may not want it. In some cases, they want the change, but their peers are not asking for change. Either way, getting change to happen in an organization requires a touchstone – some common belief or idea that everyone can relate to. It has to be more than a fact, and more emotive than a strategy. It has to be compelling, interesting, surprising, and easy to remember. In the words of Chip and Dan Heath, this central idea has to be “made to stick.”


SOA Governance Through Enterprise Architecture
In a typical SOA governance approach, a SOA Center of Excellence features stakeholders from different backgrounds and with different competencies: SOA governance specialists; SOA architects; enterprise architects, operations, security, quality assurance specialists, business analysts, etc. Every role has different objectives and needs regarding SOA, and its significance varies from one to another.


On layers in enterprise-architecture
Within any architecture – ‘enterprise’ or otherwise – every entity can be viewed in multiple ways, and often must be viewed in multiple ways if we’re to make sense of where that entity might best fit in the overall scheme. Any supposed ‘layering’ is therefore an arbitrarily-chosen overlay or filter on the overall view. The layers are an artificial abstraction based on a set of assumptions about ‘how the world works’, that exists for practical convenience only, and for a specific type of purpose only – never more than that.


Modernizing the IT governance framework for fun and profit
The IT culture has an image as the "No" team: "No, you can't use that device"; "No, you can't access that website"; "No, you can't implement that Software as a Service tool that works 10 times better than the crap we built for you six years ago and have failed to maintain"; "No, you can't use the cloud because it's not secure or can't be managed the same way we manage everything else." All of these "No you can't" decisions are well-intentioned -- or at least aren't meant to be capricious -- but the perspective is wrong.


A Persona- Driven Approach to Exploring Architecturally Significant Requirements
More often than not, requirements elicited from stakeholders describe a system’s intended functionality but fail to address qualities such as performance, reliability, portability, and availability. Documenting these requirements is often overlooked because there are implicit assumptions that the system will perform to expected levels. Unfortunately, stakeholders and developers might think they are in agreement, when in reality they have very different expectations.



Quote for the day:
 
"Excellence is in the details. Give attention to the details and excellence will come." -- Perry Paxton

December 14, 2013

The IT Department Is Dead. Long Live the IT Department
Instead of focusing on cutting costs and keeping their servers and networks secure, they argue, IT departments will act more as curators, providing tools that will make their workers happier, which translates to more productivity. For companies like his, Preston-Werner says, that means thinking about what they do in a way that doesn’t distinguish between personal and professional. That means that people can use their personal apps at work, and it means that their work software has to be just as compelling as the stuff they use for fun.


FIO Releases Insurance Modernization Report
In the report, the FIO calls for a “hybrid approach to insurance regulation that provides a practical, fact-based roadmap to modernize and improve the U.S. system of insurance regulation,” said Michael McRaith, Director of the Federal Insurance Office. “Importantly, this report reflects the dynamic nature of the regulatory system for insurers and provides an explicit path for state and federal regulatory entities to calibrate involvement going forward.”


Marissa Mayer 'very Sorry' for Yahoo Mail Outage
"Unfortunately, the outage was much more complex than it seemed at first, which is why its taking us several days to resolve the compounding issues," she wrote. Yahoo's Mail engineering team was alerted Monday night to a hardware outage in one of the company's storage systems serving 1 percent of Yahoo's users, she said. With around 100 million daily users, that implies about a million users may have been affected at the start of the week.


Yogaglo Patent Issued: What’s Happening, and What it Means for You
“We quickly realized the implications of this patent,” says Yoga International Executive Director Todd Wolfenberg. “It is a landmark issue that impacts the future of how yoga is delivered, which increasingly includes online and video study. And if YogaGlo can patent one way of filming a class, pretty soon all possible angles could become patented. So this this isn’t just about us, it’s really about the entire community and the future direction of yoga.”


The Future Of Customer Experience: Culture, Data, And Technology
They need to be able to harness the insights of disruptive technologies of our day, technologies like social, business networks, mobility, and cloud to become this predictive business. The predictive business is not going to be an option going forward. It will be what’s required not only to win, but eventually to survive. Customers are demanding it and companies’ livelihoods are going to depend on it.


How To Create A Moore's Law For Data
To make a Moore’s Law for data, we also need two layers, a data stack and a data economy layer. If both of these layers were as mature as the hardware and software industries, more data would mean more value. But these layers are just getting off the ground. I suspect most people looking to take advantage of the glut of data will benefit from thinking about how to create their own data stack and how to put it to work in the context of a data economy.


2014 IT Security Predictions: Cloud Privacy and New Malware Targets To Dominate the Year
"We predict that CSPs will begin deploying technologies like encryption, administrative access controls, and other monitoring tools, and market these more aggressively to their customers," says Michele Borovac, chief marketing officer with HighCloud Security Inc. -- a firm specializing in cloud encryption and security. "Overall, I think this will improve data security for the entire industry, which is a good thing."


SaaS Lifecycle Management (Part 2): Approach
SaaS implementations enable IT to become both a broker of internal and external services, as well as a strategic driver for growth and change. This change in purpose and function requires a different approach, one that is more creative and forward-thinking. Business and IT management must understand this fundamental shift to ensure that the IT organization has the right skills to support business growth and innovation functions.


Recommender systems, Part 1: Introduction to approaches and algorithms
Recommendation systems changed the way inanimate websites communicate with their users. Rather than providing a static experience in which users search for and potentially buy products, recommender systems increase interaction to provide a richer experience. Recommender systems identify recommendations autonomously for individual users based on past purchases and searches, and on other users' behavior. This article introduces you to recommender systems and the algorithms that they implement.


Agile Walls
BVCs are Big Visible Charts, TOWs are Things on Walls and POWs are Plain Old Whiteboards – information radiators all. Why are they valuable tools? Because everyone can see them, study them and ideally understand them. By making things Big and Visible we make them available to the entire team, not just select individuals. On the walls means that we publish them in public where we can get full cross team feedback.



Quote for the day:

"We would accomplish many more things if we did not think of them as impossible" -- Vince Lombardi

December 13, 2013

Return on security investment: The risky business of probability
One challenge with probability estimates is how to determine what the population should be (that's the denominator). This can be as simple as the organization overall -- three out of every 10 companies in the population. But more likely, the probability is based on percent of assets -- users, systems, applications -- expected to be compromised over a defined period of time. Completely crazy people (like me) may want to select a population of event actions.


Internet of things devices will dwarf number of PCs, tablets and smartphones
“By 2020, the number of smartphones, tablets and PCs in use will reach about 7.3 billion units," said Peter Middleton, research director at Gartner. "In contrast, the IoT will have expanded at a much faster rate, resulting in a population of about 26 billion units at that time." Part of this will be because of the low cost of adding IoT capability to consumer products, Gartner said, and it expects that "ghost" devices with unused connectivity will be common.


K-Means Data Clustering Using C#
There are many different clustering algorithms. The k-means algorithm is applicable only for purely numeric data. Data clustering is used as part of several machine-learning algorithms, and data clustering can also be used to perform ad hoc data analysis. I consider the k-means algorithm to be one of three "Hello Worlds" of machine learning (along with logistic regression and naive Bayes classification).


Hamish Taylor on innovation: think outside your industry
“We need to change the way we understand customers,” Taylor said. “We’ve got to get better generally at soft insights, not data.” Insightful customer understanding, he explained, comes from understanding the customer’s world, and to illustrate this he gave an example from his time at the helm of Sainsbury’s Bank.  The project was to set up the bank in the supermarket. The traditional approach suggested a bank information point, with leaflets and a desk staffed by people in uniform. In short, a traditional bank, but just situated in the supermarket.


Beyond Mobile Gestures
These gestures are becoming one of the main reasons while customers choosing their new smart phone such as battery consumption, screen size, weight or processor. The mobile phone companies are investing much on the features to be selected by customers. Especially the phone companies who offer their customer same Operating System (Android) are in the competition.


Michael Skok on Bring Your Own Cloud
The relentless consumerization of IT has moved from BYOD to Bring Your Own Cloud (BYOC). An example of this is how people are taking cloud services like LinkedIn from home to work and expecting those services to work seamlessly with technologies like their office CRM systems. As a result, LinkedIn has built a service for Salesforce.com, integrating its contact networks and social network with that CRM platform. ... BYOC is here to stay and will be a very significant force in the enterprise to drive business and on the IT side spurring adaptation to allow employees to freely consume these cloud services.


ITU standardizes 1Gbps over copper, but services won't come until 2015
The technology increases the bandwidth by using more spectrum, which could be compared to adding more lanes to a road. G.fast will use the 106MHz of spectrum, which compares to the 17MHz or 30MHz used by VDSL2 and the 40MHz used by the fastest LTE-Advanced networks currently being tested. The drawback with G.fast is that it will only work over short distances, so 1Gbps will only be possible at distances of up to about 100 meters.


Enhanced threat detection: The next (front) tier in security
The Chinese military classic, The Art of War, is commonly quoted within the security community: "If you know your enemies and know yourself, you will not be imperiled in a hundred battles…" We know the enemies well and their methods for evading detection. The "know yourself" part is somewhat lost in translation; most of us are focused on adding security countermeasures, which are not cookie cutter for every corporate infrastructure.


Steve Ballmer: The Exit Interview
ZDNet's Mary Jo Foley didn't get an interview with Steve Ballmer for 20 years but got his exclusive exit interview now that Ballmer's reign at Microsoft is coming to an end. Here, Foley and ZDNet Editor in Chief Larry Dignan discuss the highlights of that interview as well as Ballmer's hits and misses in 14 years as CEO and his larger legacy.


Bots now running the Internet with 61 percent of Web traffic
According to a recent study by Incapsula, more than 61 percent of all Web traffic is now generated by bots, a 21 percent increase over 2012. Much of this increase is due to "good bots," certified agents such as search engines and Web performance tools. These friendly bots saw their proportion of traffic increase from 20 percent to 31 percent. Incapsula believes that the growth of good bot traffic comes from increased activity of existing bots, as well as new online services, like search engine optimization



Quote for the day:

"Advice is what we ask for when we already know the answer but wish we didn't." -- Erica Jong