December 27, 2013

The Big Picture for Big Data
Several weeks ago, Information Management had the opportunity to sit down for a wide-ranging discussion with Dr. Rob Walker, vice president of decision management at Pegasystems, the Cambridge, MA-based provider of BPM and CRM solutions. Walker, who holds a PhD in computer science and began his career pioneering predictive analytics at Capgemini in the 1980s, shared his perspectives on the growth of big data and the challenges faced by companies as they struggle to derive real business value from the multitude of data management technologies that ‘big data’ represents.


How application performance metrics keep healthcare software healthy
The application performance metrics you measure for a healthcare application should be focused on improving the customer end-user experience and positively affecting the quality of patient care. Metrics that measure how software applications perform is critical to improving patient care, satisfying regulatory requirements and allowing medical professionals to do a critical job without undue interference.


Top 10 Methods to Improve ETL Performance Using SSIS
SQL Server Integration Services (SSIS) is the tool in the ETL family that is useful for developing and managing an enterprise data warehouse. A data warehouse by its own characterization works on a huge volume of data and performance is a big challenge when managing a huge volume of data for any Architect or DBA. The author in this article discusses on improving ETL performance or design a high performing ETL system with the help of SSIS.


Next step for connected devices? Connect the devices
The thinking is that the big opportunity will be for platforms, or hubs, like SmartThings, vying to tie together the so-called Internet of Things (a press friendly name for the connected device category), said IDC analyst Jonathan Gaw. With consumers actually starting to pay attention to connected products, the need will come for an easy way to manage all of them, despite their different manufacturers and ecosystems, Gaw said. To be clear, connected devices still have a long way to go before they become a mainstay, or even more than an occasional fixture, in American homes.


The first 3D printed organ -- a liver -- is expected in 2014
Advances in the 3D printing of human tissue have moved fast enough that San Diego-based bio-printing company Organovo now expects to unveil the world's first printed organ -- a human liver -- next year. Like other forms of 3D printing, bio-printing lays down layer after layer of material -- in this case, live cells -- to form a solid physical entity -- in this case, human tissue. The major stumbling block in creating tissue continues to be manufacturing the vascular system needed to provide it with life-sustaining oxygen and nutrients.


Penny Pritzker, on Hearing the Whole Story
"And when we get close to saying we want to hire someone, I will talk to them about what could get them fired. If you want to get fired, here’s what you need to do: first, lie, cheat or steal. But the other thing that will get you fired is if you have a problem and you keep it to yourself. Problems are going to happen, and it’s my job to help you with your problem. What I’ve learned is that the most troublesome people don’t tell you 100 percent of the story, and keep some facts to themselves."


2013: The Year Of Security Certification Bashing
The idea that a certification means that a person was capable of passing the test at one time is a sad statement, as it indicates stagnation in one of the least stagnant of professions. No one who worked with packet filtering firewalls has stayed in that era. The progress of the industry simply will not allow it. Most certifications require either upgrade tests or continuing professional education credits to keep the certification in good standing. This is the same method in use by other professions, such as attorneys, doctors, and accounts.


NCSU study says Android vulnerabilities are mostly from manufacturers
Researchers analyzed the customized apps that manufacturers build on top of the baseline version of Android shipped from Google. The apps provide unique features and a look and feel that's meant to make the smartphone stand out in the market. Eighty percent of the apps that come with devices are created by the manufacturers, not Google. "It is worrisome to notice that vendor customizations were, on the whole, responsible for the bulk of the security problems suffered by each device," the study said.


Data Profiling and Data Governance: How Good is This Data?
When dealing with large volumes of data coming in from a variety of sources, in different formats, and delivered by different methods a data profiling automation solution becomes a necessity to efficiently analyze data. Data profiling functionality can often be found as part of a larger data quality technology suite. Profiling tools can quickly process and analyze large data sets and automatically produce a baseline profile, thus replacing the need to run manual queries.


Building a Real-time, Personalized Recommendation System with Kiji
A typical Kiji application will include some number of KijiScoring servers, which are stateless Java processes that can be scaled out, and that are able to run a ScoringFunction using a single entity’s data as input. A Kiji application will funnel client requests through the KijiScoring server, which determines whether or not data is fresh. If necessary, it will run a ScoringFunction to refresh any recommendations before they are passed back to the client, and write the recomputed data back to HBase for later use.



Quote for the day:

"One of the most important tasks of a manager is to eliminate his people's excuses for failure." -- Robert Townsend

December 26, 2013

The top 10 cloud provider tips of 2013
Cloud service providers have had many different opportunities for growth this year, from developing cloud partner programs to building industry-specific cloud markets. Software-defined networking (SDN) was a hot topic for cloud providers this year with several of our most popular expert tips covering everything from overcoming barriers to SDN adoption to determining which model of SDN to deploy. Check out our full list of top cloud provider tips for 2013, including advice on FISMA compliance and an analysis of what "open" cloud services really mean.


Four Tech Predictions for 2014 (From PayPal’s CTO)
What happens when new products and services deliver capabilities that help innovators envision better ways of eliminating friction points that people have been living with for years? What happens is that you get the perfect conditions for the kind of rapid technology-driven transformation that has been gathering momentum in the payment industry for the past couple of years. It’s a transformation that promises to revolutionize commerce by rendering the transaction all but invisible while making the payments process itself a foundation for new experiences that connects consumers and merchants in powerful new ways.


Make a high-performance computing and high-availability datacentre
Datacentre professionals must note also that although the use of virtualisation provides a better level of inherent availability, it is not a universal panacea. Virtual images of applications, virtual storage pools and virtual network paths are still dependent on the physical resources assigned to them, and the datacentre design must take this into account. If the server running the virtual image fails, it will still be necessary to spin up a new image elsewhere on the physical server system and reassign connections.


Leading by Letting Go
The trouble was that the scripts, metrics, and rules were getting in the way. Heavily scripted representatives couldn’t form genuinely warm and empathic relationships. They sounded wooden and stilted. Real relationships are built on open, person-to-person communication, one caring human being to another. ... The results? Call-handling time edged up slightly at the very beginning, then dropped and kept falling. Likelihood-to-recommend scores doubled, indicating far more enthusiastic advocacy of American Express on the part of customers. Employee attrition was cut in half.


The reality of android soldiers and why laws for robots are doomed to failure
For Sharkey robot soldiers can't comply with the basic rules of war. They can't distinguish between a combatant or a civilian or between a wounded soldier and a legitimate target. "There are no AI robotic systems capable of doing that at all," he argues, pointing to one UK-built system that can tell the difference between a human and a car "but has problems with a dancing bear or a dog on its hind legs." A robot weapons system won't be able to judge proportionality either, he argues; that is, judge whether civilian losses are acceptable and in proportion to the military advantage gained by an attack.


SOA Best Practices in the Mobile Age
The new opportunity in APIs is BaaS, an extension to the service API model. The goal of BaaS is to convert common and useful elements of mobile application logic-storage, identity management, social network integration, photo enhancing into Representational State Transfer (REST) Web services that the application invokes as needed, making these services "back ends” to mobile apps. As a concept, BaaS is similar to Software as a Service (SaaS) and Platform as a Service (PaaS); it offers functionality as a Web service.


Martin: Issues to consider when using SSD
There may be a lot of benefits when you add solid-state storage to your environment: greater speed, lower costs of energy and greater efficiency. But the technology has a new set of issues you'll need to monitor. Dennis Martin, president of Demartek, discusses those variables in this Storage Decisions video. He noted that users of solid-state drives have to keep track of data writes to their drives, a practice that isn't necessary with hard disk.


Should everyone learn how to code?
Are good coders simply born and not made? Of course not. But it's true that the best are frequently self-taught and loved coding from the start. Without strong self-motivation, it's very, very difficult to slog your way through the painstaking labor and long hours required to become a decent programmer. To be an excellent one, you need a whole lot of experience, which is why I've heard hiring managers say they're more impressed by an applicant who wrote a mobile app at age 14 than one with a BSCS from a good school.


Venture capitalist proposes California 2.0, a plan for six new states
”Something’s not working in our state, and I’m convinced that it is with the existing system, the existing breadth of industry and varying interests. California is untenable and un-governable,” Draper told a sparsely attended news conference at the Silicon Valley school for entrepreneurship that he created and that bears his name. There were about 20 people in the room, although only six appeared to be reporters.


Visualizing Java Garbage Collection
Modern GC is highly efficient, far more so than manual allocation typical in earlier languages. People from other language backgrounds often focus on GC pauses without fully understanding the context that automatic memory management operates in. Mark & Sweep is the fundamental algorithm used for GC by Java (and other runtimes). In the Mark & Sweep algorithm you have references pointing from the frames of each stack's thread, which point into program heap.



Quote for the day:

"The final test of a leader is that he leaves behind him in other men, the conviction and the will to carry on."— -- Walter Lippmann

December 25, 2013

An Artificial Hand with Real Feelings
Now researchers at the Cleveland Veterans Affairs Medical Center and Case Western Reserve University have developed a new kind of interface that can convey a sense of touch from 20 spots on a prosthetic hand. It does this by directly stimulating nerve bundles—known as peripheral nerves—in the arms of patients; two people have so far been fitted with the interface. What’s more, the implants continue to work after 18 months, a noteworthy milestone given that electrical interfaces to nerve tissue can gradually degrade in performance.


Building a Feedback-Rich Culture
Even people who aren’t interested in or skilled at giving or receiving feedback will participate in the process (and improve) when they’re working in a feedback-rich environment. And the most ardent and capable feedback champions will give up if the organizational or team culture doesn’t support their efforts. So as leaders, how do we build a feedback-rich culture? What does it take to cultivate an ongoing commitment to interpersonal feedback? Here are four essential elements:


String externalization practices and considerations for UNIX shell scripts
In this article, we provide practical "How-Tos" and experiences on externalizing shell script messages in a product. Also, we provide suggestions on what to consider before and during translation enablement from a globalization perspective. The target audience is product developers who would like to enable their shell scripts for translation. After reading this article, readers can understand the considerations for externalizing shell script messages, realize the end-to-end process of string extraction and translation, and be aware of some known issues and their solutions.


The End of Data Scientists and Other Predictions
"We don't have a crystal ball at CMSWire — but we're curious about the future. So we’ve collected predictions from some our favorite analytics firms like Tableau, Splunk, Alteryx, Alpine Data Labs and SAP, as well as insights from the Music Industry Association and Ad Age. We’re sharing a few of them with you. For the record, these prophesies do not belong to us, nor do we"


45 Useful JavaScript Tips, Tricks and Best Practice
In this article, I’ll share a set of JavaScript tips, tricks and best practices that should be known by all JavaScript developers regardless of their browser/engine or the SSJS (Server Side JavaScript) interpreter. Note that the code snippets in this article have been tested in the latest Google Chrome version 30, which uses the V8 JavaScript Engine


Best Web Designing Frameworks for 2014
These are frameworks that can help you build fully functional web templates within minutes and with extremely minimal knowledge of CSS and JavaScript coding. There are great expectations for the year 2014. Responsive websites are already the Next Big Thing. Visitors from mobile and tablets have become an important factor for all websites. Every website has to look good and work well in every device. In this article, we will list some of the best CSS frameworks that will help web designers and developers to explore their potential to build responsive and beautiful web applications in 2014


XMLFoundation
If you are building an application that does not use XML and never will..... XMLFoundation is still a very valuable tool available to solve many very common development tasks. The data structure classes alone ( List, Hash, Stack, Tree, Array, QSort ) are very useful. They all have "Iterator" objects so that data structures can be read-referenced by multiple threads at the same time without blocking. The interface is standard to all data structures.


Blurred lines: Online file-sharing services vs. ECM software
With greater control over corporate data in the hands of users, the traditional enterprise content management (ECM) software market has been disrupted. Traditionally, ECM software has been costly and more complex, requiring user training and users logging into a corporate virtual private network (VPN) to access company files. While files are secure, ECM software hasn't been user-friendly or designed for mobility.


28 Design Principles for an Enterprise Architecture SharePoint Community
Naturally this proved to be a very powerful and compelling technique and allowed many of the design decisions to be taken simply and collectively by exploring the sensibility and applicability of each principle. Not all principles will apply in all scenarios, but those below will provide a useful starting point / thinking frame should you be presented with a similar problem. They should (of course) also be supplemented with SharePoint design best practices.


The Role of Governance in Project Management
From an organisational project management perspective, the word Governance could be interpreted as managing, controlling and administrating the organisation’s initiatives for changing and developing the business. Examples of initiatives may be to develop new or modified products and services, develop new markets, or change the organisation and its support in the form of IT systems. This also applies to contractors or engineering firms who take on projects and assignments on behalf of clients.



Quote for the day:

"Things which matter most must never be at the mercy of things which matter least." -- Johann Wolfgang von Goethe

December 24, 2013

Don’t jump the SQL ship just yet
Times are changing. RDBMS are continually evolving and embracing new features, standardising them in ANSI SQL, obsoleting JPA 2.x. In these times of change, JPA standardisation seems limiting to those who innovate in the data storage market. EclipseLink’s recent flirt with supporting MongoDB through JPA extensions shows that the standards people are not quite sure where we’re heading. But one thing seems certain. We won’t get rid of SQL so quickly. So why not start embracing it again?


Target hackers try new ways to use stolen card data
Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. "This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder's immediate geographic region," he said.


For cloud providers, fraud detection is integral part of business plan
"All of the advantages of the cloud for enterprises are the advantages for the bad guys," said Jeff Spivey, international vice president of ISACA, a founding member of the Cloud Security Alliance (CSA) and president of Security Risk Management Inc., a Charlotte, N.C., information security consultancy. "It's that anonymity and scale that's attractive to the fraudsters." Without proper cloud-based fraud detection and prevention practices in place, cloud providers can become unwitting hosts for cybercriminals.


Establishing a Process to Evaluate Ideas
Innovation is one of the keys to business success. If you don’t innovate, your business will suffer. If it isn’t made obsolete by competition, it will likely end up as a commodity business with little to distinguish it from competitors. And yet, not every new idea that a business comes up with is going to be a good one. As companies mature, many establish a process to evaluate ideas. It might be about coming up with new products or it might be finding new ways to create customer engagement.


JSFeat - JavaScript Image Processing Library
Modern JavaScript is fast, fast enough to do real time image processing. JSFeat is a JavaScript library that implements some advanced image processing and the demos prove it does it in real time. JSFeat is an open source library (MIT License) that you can download and use in almost any browser. ... What is even more impressive is that JSFeat doesn't just implement the simple image processing you find in other libraries - it also does some cutting-edge object tracking and detection.


Getting Value out of Agile Retrospectives - A Toolbox of Retrospective Exercises
This pocket book contains many exercises that you can use to do retrospectives, supported with the “what” and “why” of retrospectives, the business value and benefits that they can bring you, and advice for introducing and improving retrospectives.  Agile retrospectives are a great way to continuously improve your way of working. Getting actions out of a retrospective that are doable, and getting them done helps teams to learn and improve.


When Agile BI is Not Agile
The spirit of Agile isn’t meant to enforce rules enterprise-wide. BI projects in particular are very different than operational applications. General operational applications (and I’m sure I’m even generalizing those) seem to benefit a little more from a cookie-cutter, standardized approach. You can imagine a mobile application where you want to add a feature that allows users to tap an icon that display a customer’s shipping address. It’s relatively straightforward to know what the user wants, update the tables and code to provide that feature, and then demonstrate the existing app to a user.


Requirements, Estimation and Planning: Steps to work with Agile software development projects
This article is about requirements, estimation, and planning in agile software development projects. Agile estimation is often seen as being invaluable, yet others dismiss it as waste. The reasons for this disagreement can be traced to disparities in the Scrum and Lean-Kanban ways of working. Everybody in software development has the same goal: rapid, reliable, low risk delivery of high-quality, valuable functionality to users. So what will help them to achieve their goal? Just coding?


Vectorization, SIMD Architecture: What You Need to Know
One of the approaches to parallel programming is vectorization, which is a way of performing batch operations all with a single assembly language instruction. In the first article of a new series, Jeff Cogswell walks you through the basics of vectorization with the Intel processors. ... To fully understand vectorization, you have to know a bit about processor architecture and assembly language.


Security researcher cancels talk at RSA conference in protest
The researcher said he didn't expect EMC or the conference to suffer as a result of the alleged deals with the NSA. Nor did he expect other conference speakers to cancel. Most of the speakers at the conference are American so why would they care about surveillance that's not targeted at them but at non-Americans, Hypponen wrote. Surveillance operations by U.S. intelligence agencies are targeted at foreigners, he added. "However I'm a foreigner. And I'm withdrawing my support from your event," the Finnish researcher wrote.



Quote for the day:

"The best thing workers can bring to their jobs is a lifelong thirst for learning." -- Jack Welch

December 23, 2013

IPv6 will allow them to track you down. Not!
It is true that IPv6 will change addressing on the Internet. Many of us hope it restores the ability to identify an actual network endpoint -- a feature that we lost a number of years ago in IPv4. But some appear to be imagining a future where each machine has its very own address, and that these addresses will be easily traced whenever a person visits a website, plays a game online, or even opens an email.  In fact, IPv6 actually has features that are designed to foil these sorts of plans.


Five trends that will affect your cloud strategy
Over the next three years, we expect this trend to accelerate, with an expanded set of providers and offerings. Deploying cloud services will involve substantial integration work, and many CSBs will deliver integration services and employ business process management suites (BPMSs) to address this complexity. Steady investments by IT distributors and communication service providers (CSPs) for cloud aggregation brokerage offerings will help small or midsize businesses acquire, leverage and maximise investments involving multiple cloud services.


The IT industry must come clean on software licensing
Software publishers want to sell organisations an enterprise agreement, according to James Moy, assistant vice-president for IT asset management at Bank of Tokyo-Mitsubishi. “They love to sell their software, but if you ever ask any of the software suppliers how they keep compliant on their own software, they will have no response,” he says. Moy says most software is coded with executable file and revisions. “How does a user or company actually keep count? Take into account upgrades, patch versioning, enterprise agreements and select agreements and your head is spinning,” he adds.


Quanex halts its SAP rollout, citing a strategy shift
"This is a business planning issue," said Michael Krigsman, CEO of consulting firm Asuret and an expert on why IT projects go awry. "It has nothing to do with the technology. Any time a company changes its strategy mid-stream there are going to be mopping-up costs, which is what this is, and if they don't need the capabilities of an elaborate ERP system then they are wise not to continue with it."


CEO Says CIOs Need to Be a Source of Energy and Innovation
"Suren Gupta, our EVP of technology and operations, sits 20 feet down the hall from me, and we interact continuously. He's on our strategy and reinvention committee, which approves strategy for all our businesses. I walk down the hall to get his thoughts--not just on technology matters but also on business matters--because he's one of the architects of our business innovation. CIOs who aspire to Suren's level of impact need to learn about the business, own the transformation and teach the organization how technology can improve customer satisfaction."


eGuide: Application Integration in the Cloud and On-Premises
Application integration has always been an afterthought for buyers enthralled with the latest new app, and the pain of integration is continually forgotten. This E-Guide provides expert tips and best practices on deciding between on-premises vs. SaaS and dealing with the application integration woes that follow.


PyParallel: A Fast Parallel Version of Python
Python’s asynchronous support is somewhat problematic. It is designed around the Unix/Linux idea of synchronous, non-blocking I/O. This is where a thread continuously polls for incoming data and then dispatches it accordingly. While Linux is tuned for this pattern, on a Windows machine this is disastrous for performance. It is really expensive to copy the data from the polling thread to the thread that will actually process the work. So what PyParallel delivers instead is true asynchronous I/O using the native I/O Completion Ports (IOCP).


Information technology and corporate governance
Control objectives in IT (COBIT) is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. One may visit the ISACA website for a detailed discussion and guidance on IT governance and COBIT. At the end of the day, IT governance has to create value for the business over and above associated costs. ... This requires companies to have people who understand both business and IT.


What I've Learned from 3 Years in the Gamification Industry
"According to Google Trends, the first news article citing the term gamification appeared in August 2010. Badgeville officially launched in October 2010 (at TechCrunch Disrupt.) As a marketer helping grow a new industry, beyond making sure people knew about our product and the value it adds to their businesses, our team had to carefully help explain what gamification was and wasn't."


Seven Tips for Stress-Free Project Leadership
An essential component of the art of stress management is the ability to realize that anxiety, for all its negatives, is not the problem; the problem is how we often choose to deal with it. “When you have just enough anxiety though, you have the productive energy you need to turn your thinking and feeling into positive action,” says Robert Rosen, author of Just Enough Anxiety: The Hidden Driver of Business Success.



Quote for the day:

"Disruption is about risk-taking. But then you become a Fortune 500 co., which is about risk mitigation" -- @SteveCase