January 14, 2014

Enterprise master data management and big data: A well-matched pair?
"Applying MDM against raw, unstructured content is of questionable value," said Evan Levy, vice president of business consulting at analytics and data management software vendor SAS Institute Inc. "But distilling that content down to have some sort of meaning and then linking it to a specific customer -- that's where MDM can come into play." Companies are starting to see -- or picture, at least -- a connection between enterprise MDM and big data, according to survey results published in November 2012 by The Information Difference Ltd.


C++ String Toolkit (StrTk) Tokenizer
Tokenization in the context of string processing, is the method by which a sequence of elements are broken up or fragmented into sub-sequences called tokens. The indices in the original sequence that determine such breaks in the sequence are known as delimiters. There are two types of delimiters, normal or thin delimiters which are of length one element and thick delimiters which are of length two or more elements. Even though tokenization is primarily used in conjunction with strings, any sequence of types that can be iterated in a linear fashion can be tokenized, examples may be list of integers, a vector of person classes or a map of strings.


Scaling Storage Is Hard To Do
How do you add capacity and performance without drastically re-architecting storage systems? For the last decade, enterprise storage vendors have relied on clustering as a means to scale. Each clustered controller is locked in a “mind meld” with every other, sharing precious data maps and caches in real time, enabling customers to add whole arrays for greater capacity and performance.


Bridging Big Data and the Personal Data Ecosystem Through Privacy by Design
In order to make the interactions between Big Data and individuals more sustainable—in other words, to effectively transform this “new oil” into a renewable resource—the concept of the personal data ecosystem (PDE) has been proposed.4 The PDE is the emerging landscape of companies and organizations that believe individuals should be in control of their personal information and directly benefit from its use, making available a growing number of tools and technologies to enable such control.


Intel Announces Death of McAfee Brand. Will it be That Simple?
The decision is not entirely unexpected despite the fact that it has taken Intel longer than normal after the acquisition to resolve to drop what remains one of the two or three most famous security brands in existence. Intel is banking that attaching its own brand to the word 'security' will more than offset any loss in recognition. McAfee cost Intel $7.68 billion (at the time around APS5 billion) in August 2010, still a record price for a pure security firm so it might feel it has the right to impose its own identity.


Defining Responsiveness
When people say that something is responsive, what do they mean? I’m not being facetious. I think many of us think we know what is meant, but when you dig deeper, there is disagreement about what it means for something to be responsive. ... So by definition, Google Plus is not a responsive web design. It may look like one, but it doesn’t contain the three technical pieces necessary to be a responsive web design.


Considerations for Data Center Owners When Partnering With Modular Builders
Modular data center companies appear in all forms, from modularity at rack levels to modularity at building levels to modularity at infrastructure levels. A data center owner needs first to decide at what level they would like to engage in modular deployment. If the path chosen is a fully modular data center, it becomes significantly more important to engage your potential partner at the very early stages of concept and design.


Don't panic: The Internet is not collapsing, despite a spike in global 'attack' traffic
The Internet isn't about to collapse or crumble, despite two long threads on popular technology site Hacker News and news-sharing site Reddit suggesting (in some cases) that it might. Pointing to Akamai's Real-time Web Monitor, which tracks "global Internet conditions around the clock," many drew concern from the meter showing that attacks were — at the time — up as much as 98 percent. At the time of writing, the meter showed attacks were up by close to 107 percent above normal.


All About TransactionScope
In the real world any one you will find exceptional scenarios, exceptional issues where only a knowledge of how to useTransactionScope is not good enough. To resolve transactional issues like deadlocks, timeouts, etc., you must know each and every concept directly/indirectly related to a transaction. There is no alternative. So the concepts of a transaction and its related components need to be clear.


Intelligent Evolution: Making Change Work
When these organizations try to change, they frequently fail because we forget that they are complete creatures and need to be changed in depth. Trying to improve the practices of the engineering department without paying attention to the rest of the organization is similar to trying to change an organ within a body without understanding the impact on the rest of the body. Imagine that a surgeon performs a liver transplant without considering whether there is a potential difference between the livers of different people. We would have a high probability of organ rejection and potentially death of the patient.



Quote for the day:

"Everything I've ever done was out of fear of being mediocre." -- Chet Atkins

January 13, 2014

MDM program needs business sense to be successful
Companies pursue MDM as a technology-driven affair. "There are far too many efforts where the IT team is pushing the MDM idea, and there isn't enough pull from the business side because there isn't a clear articulation of what the business outcomewill be," said Gartner analyst Ted Friedman. "Somewhere along the way, the project fizzles out." Aaron Zornes, chief research officer at The MDM Institute, a consultancy in Burlingame, Calif., made the same point.


5 Methods for Visualizing Unstructured Data
What can anyone possibly do with so much data? It's not even a question of quantity anymore - it's more a question of feasibility. One can put up a thousand powerful computers in parallel and crunch huge data sets to derive results. But what if the data is also unstructured? What if the problem is not in finding the solution but in finding the correct questions to be asked in the first place? Everybody can obtain a huge data set, and almost anybody can acquire the right set of tools to analyze that data, but very few “somebodies” possess the right mindset to use the data to begin solving business problems.


Hyping Artificial Intelligence, Yet Again
A.I. is, to be sure, in much better shape now than it was then. Google, Apple, I.B.M., Facebook, and Microsoft have all made large commercial investments. There have been real innovations, like driverless cars, that may soon become commercially available. Neuromorphic engineering and deep learning are genuinely exciting, but whether they will really produce human-level A.I. is unclear—especially, as I have written before, when it comes to challenging problems like understanding natural language.


Agile Database Development
Agile database development is particularly hard because databases contain state and must ensure data integrity. They are harder to upgrade or roll back than the front end of a website and so are more amenable to up-front design than continual refinement. Lastly, database developers and DBAs tend to have less experience in Agile practices, leading to additional struggle in the early stages. This article will explore the history and principles of Agile development with an emphasis on how we can apply Agile practices successfully to databases.


Demand For Fully Automated Static Analysis Solutions To Grow In 2014 Says Asaph Schulman
Application Security has become a key aspect for all organizations assessing their overall risk exposure. The reality is that due to significant historical investments made by enterprises to bolster their network security, the easier way for attackers to hack these days is through the "main door" – the application layer. By pretending to be regular users of the attacked web or mobile application, hackers abuse insecure application coding to gain unauthorized information such as the administrator's or user's credentials. This can lead to some disastrous results, including the hacking of entire networks.


Brainlike Computers, Learning From Experience
Designers say the computing style can clear the way for robots that can safely walk and drive in the physical world, though a thinking or conscious computer, a staple of science fiction, is still far off on the digital horizon. “We’re moving from engineering computing systems to something that has many of the characteristics of biological computing,” said Larry Smarr, an astrophysicist who directs the California Institute for Telecommunications and Information Technology, one of many research centers devoted to developing these new kinds of computer circuits.


What the Heck Is a RAM Scraper?
First it’s helpful to remember that payment systems — the cash registers and credit card terminals you see in stores and restaurants every day — have a lot of strong requirements for encrypting data, pretty much end-to-end during the transaction process, as well as any records that are stored afterward. But there’s one particular moment when that data is vulnerable, and it occurs during the milliseconds that it is stored in the system memory — a.k.a. random access memory, or RAM — of the back-end server that processes the transaction.


Android vs Windows: Now the battle for the desktop really begins
As ZDNet's Larry Dignan points out, Android could break through on the desktop as it has on mobile if the cost is right and security improves. There are plenty of hurdles in the way of Android becoming a real threat to Windows on the desktop, but it's still a headache for Microsoft. If people don't buy Windows, they probably won't buy Office either, and they're less likely to buy into the whole ecosystem from Windows Phone to Azure. And the desktop is Windows' redoubt: that Android dares to advance upon it is reflection of how the battle of the tech ecosystems has gone so far.


Why innovators need a word other than failure
An experiment is an attempt to test a hypothesis, and gain new learning. The problem with the word "experiment" is that experiments are not meant to be permanent solutions, but rather short trials in which we test a solution, hopefully with a hypothesis, and then compare the results to expected or anticipated results. But what we are often talking about when we talk about "failure" is more akin to experimenting - testing, learning, reworking, testing again and finally implementing.


Emergent Change: Shifting to a complexity paradigm
The traditional approach to organizational change has been a tightly planned process with objectives established by top management. This planned approach to organizational change is reinforced with the publication of numerous best practice case studies for change, detailed guides for leading the neophyte through the change wilderness, and studies of what is needed to remove barriers (mainly employee resistance) to proposed change. Yet the majority of these change efforts fall far short of the objectives that were set by the proponents of the change



Quote for the day:

"A healthy attitude is contagious but don't wait to catch it from others. Be a carrier." -- Tom Stoppard

January 12, 2014

The Ever-Increasing Importance of Predictive Analytics
Pretty much anywhere you look, you can find countless examples of how this trend is manifesting itself. As just one, Forbes recently reported that Google is making numerous changes to its Google Analytics platform and a number of other search guidelines and algorithms, which will have a colossal impact on the operations of content creators in 2014. However, few things in the big data and analytics space are likely to have the overall weight that predictive analytics are expected, by many experts, to possess.


Tablets Get More Sophisticated, with Bigger Screens, Dual OSes and Car Access
German car maker Audi unveiled an Android device that it plans to bundle with its cars. The Audi Smart Display connects to a car via Bluetooth and can be used to remotely access and control the vehicle's music, radio, and navigation systems. The 10-inch tablet can also become a typical Android device with access to the Google Play app store. Audi is calling the tablet a next-generation in-car entertainment device that Audi buyers can choose to purchase as an additional feature. However, the company wouldn't name a ship date, only saying the device would arrive in the near future.


The Relationships between MOOD/QMOOD Metrics and External Software Quality Attributes
Empiricalstudies have been conducted to evaluate these metrics as indicators of external software quality attributes (ESQAs). However,there has been no attempt to systematically review and report these empirical evidences. To identify the relation ofMOOD/QMOOD metrics with ESQAs, we have performed a systematic review of empirical evidences published in the literaturethat support or reject MOOD/QMOOD metrics as indicators of ESQAs. Our search strategy identified 413 papers, out of which15 papers were identified as reporting empirical evidence showing relation between CK metrics and ESQAs.


Using Scenario-Based Architecture Analysis to Inform Code Quality Measures
Scenario-based architecture analysis offers a broad understanding of how a software-reliant system evolves over time and can form a basis for assessing the amount of rework that may be necessary in the foreseeable future. Using the architectural risks identified during scenario-based architecture analysis, we clarified the level of system decomposition where code quality metrics reveal relevant information


Reasoning and Improving on Software Resilience against Unanticipated Exceptions
Exceptions are widely used in prac- tice [6]. To us, the resilience against exceptions is the ability to correctly handle exceptions that were never foreseen at specification time neither encountered during development. Our motivation is to help the developers to understand and improve the resilience of their applications. This sets a three-point research agenda: (RQ#1) What does it mean to specify anticipated exceptions? (RQ#2) How to characterize and measure resilience against unantic- ipated exceptions? (RQ#3) How to put this knowledge in action to improve the resilience?


The Internet of Things outlook for 2014: Everything connected and communicating
IoT isn't just a fancy buzzword that describes how your refrigerator can let you know when you need to replace your spoiling milk or your rotting vegetables (although it can), it is so much more. How much more is only left to your imagination and to your budget. You can do as little or as much with IoT as you want. For example, if you operate food distribution business, you could install sensors in your trucks that send temperature, humidity, and dock-to-dock travel times back to your home office for analysis.


Naming and Classifying: Text Analysis Vs. Text Analytics
Analysis is an examination of structure, composition, and meaning that provides insight to advance some purpose. Analysis may be heuristic, informal, and/or qualitative. Contrast with analytics, which is algorithmic rather than heuristic. I define analytics as the systematic application of numerical and statistical methods that derive and deliver quantitative information, whether in the form of indicators, tables, or visualizations. Analytics is formal and repeatable.


The Future of Business Intelligence: An Impending Realization
What once appeared as two opposing trends that could potentially cancel each other out has merged into a synthesis in which formal education in the field – in addition to developments in automation, Data Discovery tools, Cloud computing and Big Data – is readily used to simplify the process of leveraging BI for laymen. BI’s crossroads has become a solitary path paved by the consumerization of (and burgeoning familiarity and comfort with) IT, which Gartner describes as “how enterprises will be affected, and how they can take advantage of new technologies and models that originate and develop in the consumer space, rather than in the enterprise IT sector.”


Windows Azure Security Guidance
In cloud applications more responsibility lays on the shoulders of the application developers to design, develop, and maintain their cloud applications to high security standards to keep attackers at bay. Consider the following diagram (from J.D. Meier's Windows Azure Security Notes PDF): notice how the infrastructure part is being addressed by the cloud provider--in our case by Windows Azure--leaving more security work to the application developers:


Data Integrity, Physical Security and REST APIs Contribute to Tape's Ongoing Relevance
Other benefits which tape still holds strong are its security and reliability. Data backed up to tape is typically more secure than data stored on disk or on the cloud because, in part, tape can make data more difficult to access and then retrieve. The average hacker is more likely to spend time trying to hack data stored in a cloud or on disk than to go to the trouble of breaking into a storage facility where tape backups are stored, retrieve those tapes, load them into a tape library, and then go through them linearly to find and access the data they store.



Quote for the day:

"There is only one thing more painful than learning from experience and that is not learning from experience." -- Archibald McLeish

January 11, 2014

Watch out for these 10 common pitfalls of experienced Java developers & architects
There is a ton of information on how to get a wide perspective on a large enterprise project: scaling your architecture, message busses, database interconnections, UML diagrams and other high-level stuff is well documented. But what about those of us who are just experienced, professional Java developers? This area is lacking coverage, and programming advice for the senior developer, team leader or the junior architect is hard to find.


Intel Has Its Eyes Fixed on Networking
You know Intel’s long history of supplying the main chips that run personal computers and servers. And you probably know that it supplies some chips for mobile phones and tablets, though not quite as many. But did you know that Intel is also getting into the business of supplying chips for networking gear? The way the chip giant sees it, there’s a $16 billion business of supplying processors for gear that moves data, whether it’s in a corporate data center or on a telco carrier’s network — or anywhere in between. And it reckons that it already has about a five percent share of that business.


How to Cultivate Senior Management Skills
Edward T. Reilly, chief executive officer of American Management Association International, assembled a book for new and experienced leaders titled AMA Business Boot Camp. Let me share with you some of the helpful advice to be found in the book. Here are some “Action Items” assembled to help managers cultivate senior management skills, like:


No Brain Drain in Bulgaria as IT Experts Stay Put
Kiril Karaatanasov is typical of the experienced developers and their success. He owns a house and a flat, and is about to buy his third property, something unthinkable among his foreign contacts. “A friend of mine in Silicon Valley can hardly afford to pay the rent for a house smaller than my flat,” Karaatanasov says. “Silicon Valley is better than most of the older EU countries and most of my German friends and French friends move there for money.”


The 7 best habits of effective security pros
The role of the security professional has evolved beyond that of mere technical savvy, and now includes consultant, educator, investigator, and defender of the data. To understand the traits and habits that matter the most, we reached out to a number of security professionals by phone, email, and social media, who are successful in their respective areas in the field. If there's one thing that screamed out from the interviews it was this: security knowledge alone is only the beginning of the skills and habits one needs to succeed.


Big Data Strategy: s+b’s Strategy of the Year
Big data strategy is the latest example of how a particular something-strategy can suddenly win rapt attention on the runways of corporate fashion. Businesses are drowning in an explosion of data unleashed by the convergence of low-cost, high-volume computing; ubiquitous wireless telecommunication; and the Internet’s continued penetration into more and more aspects of our daily lives.


IBM’s Watson to Help Rich DBS Clients With ‘Jeopardy’ Smarts
The Singapore-based bank plans to begin using the tool, which can answer questions in conversational language and learn from responses, to aid financial planners in guiding its wealth-management unit’s affluent customers, IBM said today. Watson will analyze large volumes of financial data to help DBS, Southeast Asia’s largest lender, offer more customized service. The agreement gives IBM a proving ground as it tries to show clients the value of its Watson technology.


Just Say No to Tech Purchases That Won’t Yield ROI
Paying for that new computer, software, mobile device, or peripheral is only the first expense you’ll incur with most technologies. Smartphones have voice and data plans. Laser printers tend to eat up expensive ink and toner. And pretty much everything you buy for your employees needs tech support. That support could be as simple as having your resident geek run a virus scan or as complicated as bringing in a technician to troubleshoot your network.


The Sustainability Agenda in Kanban
Kanban is the humane, start with what you do now approach to change. That humane side is captured in a system of nine values. These explain the motivations of the method and they provide a helpful starting point for exploring how it actually works. Each value identifies a goal of one or more of Kanban’s principles or practices and suggests some of the benefits to be derived from following them. Conversely, they suggest that the pursuit of those goals and benefits may be well served by the adoption of their respective method elements.


Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property
In today’s market, it’s essential for software publishers to solidify their competitive advantage by securing their innovative and unique products against reverse-engineering, which can lead to duplication by competitors looking to fast-track their development efforts and time to market with a competitive alternative. With competitive espionage becoming more and more common, valuable software IP containing code, algorithms, application data files and trade secrets is at risk of prying eyes, reverse engineering, theft, and copycatting by competitors.



Quote for the day:

"Be careful the environment you choose for it will shape you;be careful the friends you choose for you will become like them" -- W. Clement

January 10, 2014

Security analysis of mobile banking apps reveals significant weaknesses
While banking apps generally use SSL encryption for sensitive communications, Sanchez found that 90 percent of the tested apps also initiated several non-encrypted connections during their operation. This allows attackers who can intercept that traffic -- for example on an insecure wireless network -- to inject arbitrary JavaScript or HTML code into it, for example to display fake login prompts to the app's user or to launch other social engineering attacks. In addition, even when using encryption, 40 percent of the tested apps did not validate the authenticity of digital certificates they received from the server, making them vulnerable to man-in-the-middle attacks using fake certificates.


Data visualization best practices help users envision business success
"The context of why visualization is so powerful is because as people we're really wired to process images much better than the way we've been working, which is just [with] columns and rows of numbers," said Feinberg, president and founder of DecisionViz, a consultancy in Westfield, N.J., that helps companies develop and implement data visualization strategies and processes. He said visualization tools also open the doors to analytical data to more business users in organizations, which can help improve decision making and instill a more data-driven culture internally.


Simple and fast CSV library in C#
This library allows to save a collection of objects to a CSV file. It also allows loading from CSV files with linq expressions. It is: Simple to add to your application (Single C# file); Simple to use (loading and saving can be done with a single line of code); Fast (the demo creates a million client records in 2 seconds on my laptop); and Small memory footprint (tested with over 10,0000,000 records).


Net Medical Xpress Releases HIPAA-compliant WebRTC-enabled Telemedicine Solution
RTC (real-time communications) Conference Switch is HIPAA-compliant, which means that medical providers can discuss and transmit patient information without fear of compromising HIPAA and HITECH regulations. "Our RTC Switch, which is RSA asymmetrical, includes precise audit controls, public/private key encryption and Net Medical's Safety Pilot permission software," explained CEO Dick Govatski. Safety Pilot is a security protocol that routes calls and shared files through a complex route of encryption, authorizations, permissions and auditing. Doctors and patients can communicate via telemedicine without concerns about malware or unauthorized data access.


Ways To Deal With Botnet
Botnets use multiple attack vectors; no single technology can provide protection against them. For instance, the goal of a DDoS attack is to cripple a server. The goal of a phishing attack is to lure users to a spoofed Website and get them to reveal personal data. The goal of malware can range from collecting personal data on an infected PC to showing ads on it or sending spam from it. A defense-in-depth approach is essential to detect and mitigate the effects of botnets.


Network Monitoring Best Practices: Setting a Network Performance Baseline
In the simplest terms, a network performance baseline is a set of metrics used in network performance monitoring to define the normal working conditions of an enterprise network infrastructure. Engineers use network performance baselines for comparison to catch changes in traffic that could indicate a problem. Setting a network baseline also provides early indicators that application and network demands are pushing near the available capacity, giving the networking team the opportunity to plan for upgrades.


Curb Appeal: The Tipping Point for Redesign
When you’re working with limited resources and a small team though, you have to look for inspiration across different functions. You might be surprised to find that inspiration and innovation don’t just come from specific job titles. For us, the initial idea and design for our new homepage came from one of our software engineers during a monthly hack day. An unlikely source, yes – but it turned out to be not just a radical shift from our current site — but a shift we all believed might actually work for our members.


Intel's 64-bit Android 4.4 OS for x86 smartphones ready for OEMs
64-bit Android could reach tablets first. Intel said 64-bit Android tablets powered by its Atom processor code-named Bay Trail will become available in the first half of this year. The tablets are expected to sell for as low as $150. The code completion paves the way for device makers to load 64-bit Android and their own user interfaces on devices. A full 64-bit Android is not yet available on smartphones or tablets. Intel also hopes developers will start writing 64-bit applications for Android smartphones running on Atom chips, the spokeswoman said.


Hot data storage technologies for 2014
Some of our predictions are about storage technologies that have only recently emerged from R&D labs, but they bear so much promise that we think they will weigh in immediately. That's the nature of the storage market today: Technologies that used to take years to evolve and gain a following are topping the charts in short order these days. Case in point: solid-state storage's meteoric rise. In fact, the ever-developing flash storage is featured in this year's predictions, with two solid-state techs -- Non-Volatile Memory Express (NVMe) and 3D flash -- about to spring into prominence.


Coverity Testing Platform Expands Java Web App Coverage, Revamps C# Analysis Engine
Coverity Development Testing Platform 7.0 broadens Java Web application security coverage, adds new security audit views and reports, and revamps its C# analysis engine in what the company describes as a a major rewrite. The platform combines code analysis, change-aware unit test analysis, and policy management across the three most widely used enterprise programming languages: Java, C/C++, and C#.



Quote for the day:

"How committed are you? There is a remarkable difference between a commitment of 99% and 100%." -- Vic Conant