February 08, 2014

7 ways Big Data can help your BI solution
Big Data continues to be the buzzword du jour. And as with most popular concepts espoused by everyone from marketers and consultants to purveyors of software and infrastructure, the phrase can mean different things to different people. For us at Sullexis, we think of Big Data as a set of technologies that enable our clients to consume and process high volumes and/or diverse types of information. But our clients need ROI. Neither access to a large amount of diverse data nor possession of the most sophisticated Hadoop stack of Big Data technologies will generate ROI without the right application.


MobileFirst, API's, and PaaS - Field Perspective
Enterprise back ends have grown more complex. The larger the enterprise, the better the possibility that you have to fetch data from a shared back end. This leads developers to develop an application Domain Model that represents the business view of the application. When an application will have to access multiple back ends then a Domain Model typically referred to as a Canonical Data Model, which represents the data model for an enterprise and maintains relationships to different back end systems.


Disinformation Visualization: How to lie with datavis
When working with raw data we’re often encouraged to present it differently, to give it a form, to map it or visualize it. But all maps lie. In fact, maps have to lie, otherwise they wouldn't be useful. Some are transparent and obvious lies, such as a tree icon on a map often represents more than one tree. Others are white lies - rounding numbers and prioritising details to create a more legible representation. And then there’s the third type of lie, those lies that convey a bias, be it deliberately or subconsciously. A bias that misrepresents the data and skews it towards a certain reading.


Phones, Browsers, and Search Engines Get a Privacy Overhaul
Blackphone, a smartphone to launch next month, is perhaps the most ambitious of these projects. The Android handset will function like a regular smartphone but has a series of modifications to protect the privacy and security of its owner. Blackphone is a joint venture between Spanish smartphone manufacturer Geeksphone and Silent Circle, a company that Phil Zimmerman, inventor of the PGP encryption software (see “An App Keeps Spies Away from Your Phone”), founded to make apps that encrypt voice calls and text messages.


This iPhone-Sized Device Can Hack A Car, Researchers Plan To Demonstrate
The Spanish researchers’ work adds to a growing focus in the security industry on the vulnerability of networked automobiles to hackers’ attacks. Before the Defcon hacker conference last July, researchers Charlie Miller and Chris Valasek put me behind the wheel of a Ford Explorer and a Toyota Prius and then showed that they could plug their laptops into a dashboard port of vehicles to perform nasty tricks like slamming on the Prius’ brakes, jerking its steering wheel and even disabling the brakes of the Explorer at low speeds.


Personal History May Thrust New Microsoft CEO Into Visa Debate
Nadella earned a master's degree in computer science at the University of Wisconsin in Milwaukee, and an MBA from the University of Chicago. Neil Ruiz, a senior policy analyst at the Brookings Institution, doesn't believe that Microsoft is trying to make any policy points with the Nadella appointment. But by nature of his background, "he can add a more human touch to the Microsoft message" in the immigration debate.


How to Avoid Irrelevance, Guaranteed!
You might be an innovator, developer, organizer, maximzer, or activator. But, irrelevance looms large if you can’t apply your strengths – in relevant ways – to the people you serve. Peter Drucker said, “The purpose of a business is to create a customer.” A.G. Lafley, CEO of Procter & Gamble, was mentored by Drucker. Lafley listened to his mentor. The first core strength of P&G is a deep understanding of the customer. (Game-Changer by Lafley and Charan)


NoSQL Vs. RDBMS for Interactive Analytics: Leveraging the Right and Left Brain of Data
Limiting the structured versus unstructured debate to just operational use cases ignores three key factors for downstream analytics: the tools, domain expertise and SQL compatibility gaps in the current NoSQL ecosystem, the challenges of exporting and warehousing volumes of this changing, semi-structured data and hidden costs of leveraging operational databases for complex, ad hoc analysis. Here is what organizations must additionally consider for their analytics needs as they evaluate NoSQL and RDBMS.


Are Analytics Shifting Power from Executives to Employees?
Executives can no longer hoard decisions at the C-suite level. Savvy executives are realizing they must now delegate and distribute decision rights deeper into their organization to empower their managers and employees. This is because of the exponentially growing mountain of data, both structured (numbers) and unstructured (text) data including social media, and a sped-up and volatile world. In my imagined pyramid, the executives are at the top, just like in an organization chart. Their decision types are strategic ones.


Why effective Web app firewalls are worth the investment
Many organizations look at Web app firewalls as protection technologies that are deployed to detect and stop attacks before they can result in some sort of loss or compromise. This is certainly desirable, but, as previously discussed, actually achieving these results can be challenging and involve hidden or unplanned costs. An alternate way to look at a WAF deployment is to consider it a way to gain intelligence about the application's usage and attack patterns.



Quote for the day:

"The harder you work, the harder it is to surrender." -- Vince Lombardi

February 07, 2014

An innovation management approach where ideas don't go to die
Intuit Inc. knew it had to change up its approach to innovation management when employees started complaining that its collaboration tools were the graveyard where good ideas went to die -- that's not good for a company that had reinvented accounting practices with its financial software. The upshot was Brainstorm, explained Roy Rosin, vice president of product management and innovation at the Mountain View, Calif.-based company. In this podcast excerpt, Rosin outlines the steps to building a culture of innovation and why serial disruption is a necessary part of the idea creation process.


Starbucks hits $1B in mobile payment revenues in 2013, analysis says
"In general, we're really encouraged that customers have embraced [the program]... and are keeping track of loyalty points," Jantzen said. "We very much value our customers and their loyalty." Starbucks for years has tracked alternative payment technologies to barcode scanning, such as near field communications on smartphones, but the coffee seller decided to go with what was available and proven when it launched mobile payments in early 2011.


Are Purchasing Practices Killing Your Software Projects?
Heads-I-win, tales-you-lose pricing. I go on endlessly about the perils of fixed-price projects; namely, how they can poison the agile methodology that's the core of lowering project costs. Asking a consultant to absorb the risk of fixed price can mean doubling the bid. Some clients take it a step further with "hourly rates, with not-to-exceed" clauses. This makes perfect sense to every purchasing manager in the world, but it contaminates your project with sloppy thinking, gamesmanship and an adversarial relationship. Agile requires trust. If you aren't willing to start there, go back to waterfall.


You won't believe what happened when Microsoft made Bill Gates its "Technology Advisor"
As a business, one option is to grow into that new space. The other, my preferred option if I'm being honest, is that they don't. So what's the deal? Does the Nadella+Gates combo mean that Microsoft is going to focus on enterprise IT, work on just that core business, and keep it safe? That for me works fine. But if the idea of this is that Gates is the person who can lead Microsoft out into a greater universe where enterprise IT plays a tiny role? I can't see that working so well.


Outside the Box: NoSQL Document Databases
What JSON allows is for an application developer to manage the information that they store about a particular object - customer, product, region, etc. - without having to go through the process of checking the database, asking for a change request, etc. The processes of the "modern" IT department have become too ordered (and some might say immovable) to make a nimble adjustment as business and technical requirements arise.


Virtual PM – It’s Virtually Everywhere
Soooo … is project management virtually everywhere? Well, a lot of people pursue and attain their objectives in less-than-smart ways, but, sure, PM is everywhere, even if it’s not recognized as such. Think about the two main information streams that support smart project management decision-making: earned value, and critical path methodologies. Sound daunting, don’t they? Well, they’re not. Follow me on this little mental exercise for proof.


Enterprise innovation management strategy guide
CIOs and other top IT executives play a vital role in creating enterprise innovation programs that deliver both short- and long-term benefits. Over time, as innovation becomes “business as usual," it's necessary to refresh and revitalize the innovation process, and be prepared to deal with the organizational obstacles that accompany it. This guide is part of SearchCIO.com’s CIO Briefings series, which is designed to give IT leaders strategic management and decision-making advice on timely topics.


US to push for mandatory car-to-car wireless communications
V2V communications use a variation of the 802.11 wireless network standard used by laptops and mobile phones, but instead link cars, which can share position and speed information with each other 10 times per second. That can let one car reliably detect when another in front is braking hard, for example. V2V technology initially will assist drivers, but NHTSA is considering linking it to "active safety technologies that rely on on-board sensors." That could let a car brake or steer to avoid a collision without driver involvement.


Get Ready for Big Data Heists
Already there has been the massive plastic card data theft in South Korea, affecting about 60 million cards; the Target Corp. credit card disaster involving up to 40 million customers; the hacking of 16 million German e-mail accounts; data security breaches at Nieman Marcus Inc. and Easton-Bell Sports Inc.; and a group of Russian hackers who compromised the computer systems of Western energy and defense companies, governments, and academic institutions. We're still in January. These security breaches were all different but had a common cause: negligence


The Future of PaaS in Cloud Computing
There has been a raging debate about Platform-as-a-Service and whether it is still a valuable part of a cloud portfolio, so InfoQ reached out to four leaders in the cloud domain for their opinions on the future of PaaS. In this interview, cloud advocate Krishnan Subramanian, cloud developer Dan Turkenkopf, cloud executive JP Morgenthal, and cloud expert James Urquhart discuss misperceptions about PaaS, and its role in the future of cloud computing.



Quote for the day:

“Lead from the back - and let others believe they are in front.” -- Nelson Mandela

February 06, 2014

The Performance of the T-SQL Window Functions
Microsoft introduced the first of the class of window functions in two flavors: Ranking and Aggregates, and released further functions in subsequent releases. ... Although there is no doubt that the window functions add richness to the SQL language, greatly simplifying the syntax and queries they appear in, we’re still left with the nagging doubt as to whether they are as fast as the older methods. They’re more easily maintained, but are they faster? This is what we want to find out.


NASA CIO unable to implement effective IT governance
"NASA's current IT governance model weakens accountability and does not ensure that IT assets across the Agency are cost effective and secure," writes the OIG. NASA's governance model is composed of three governance boards that report to the mission support council; there are also sub-boards and working groups. "We found that the complexity of the board structure and a lack of documentation and training to explain the interrelationship of the boards has led to confusion among agency IT personnel about the roles and responsibilities of the boards and diminished their value to the governance process," write report authors.


Integrated Independent Testing – Alternative Approach To Software Quality Assurance
... in this paper an alternative approach – Independent Integrated Testing that helps in reaping the majority of the independent testing benefits in addition to optimizing the test cost is proposed. This approach utilizes the services of the specialized testers and at the same time tries to optimize the effort by eliminating a longer bug life-cycle process. The details of the approach are elaborated in the subsequent sections. To bring out the differences between the two methods clearly, at first the independent testing approach is explained and then the new approach.


Microsoft's Cloud Chief on Windows Azure, Tools and More
Known as "ScottGu," Guthrie is notorious for the red polo shirts he sports at events where he is a big draw in coding demos. Guthrie has spent his time at Microsoft in the company's developer and cloud groups. He worked his way up to the role of corporate vice president of the .Net platform in company's Developer Division and later became the corporate vice president of Windows Azure, which he left for his new position


Big Data, the Internet of Things and the Death of Capitalism?
Rodney Brooks, former Panasonic Professor of Robotics at MIT and founder of Rethink Robotics, says "We're at the point with production robots where we were with mobile robots in the late 1980s... The advances are accelerating dramatically." The Rethink Robotics videos show some agonizingly slow-motion action, but it doesn't need Clayton Christensen to recognize a potential disruptive innovation here. The process about to be disrupted is the manual labor involved in a whole variety of repetitive but loosely bounded activities on assembly, packaging and similar production lines.


New ITSSM Tool, or Nah?
There is no shortage of information available to help you make a decision, and the authors surmise that we tend to trust “the averages” over our instincts — but not as much as we should. We lock ourselves in an “inside view,” which is our evaluation of our specific situation. This plays out on my inquiry calls with clients, who conclude that their IT organization is a mess and that a new technology solution will be the catalyst for positive change.


The Cost of Risk Avoidance
What they are missing is that certainty comes at a cost. Certainty robs us of a just reward, the very incentive that motivates us to pursue opportunity in the first place. The fallacy that risk avoidance somehow is without cost and therefore an acceptable strategy fails to consider opportunity cost. Too often opportunity cost is disregarded because we base our decisions on superficial criteria or the immediacy of a potential negative effect.


Study Finds Companies’ Mobile Computing and Business Intelligence Preferences Changing
Organizations looking to deploy mobile BI solutions need to recognize that their existing infrastructure will certainly become inadequate over the course this this year. The folks that I’ve spoken with that have deployed mobile BI had to really bolster their data infrastructure because the existing data warehouse or whatever solution they used couldn’t handle the mobile load. People use mobile devices more frequently to query BI data. Multiply that times hundreds or thousands of users, and it will exhaust the resources most organizations have.


SATA Express marries PCI-e, SATA for faster direct-attached storage
The SATA Express specification now recognizes PCI-e as a suitable storage interface for fast storage devices. Conventional drives will continue to use the server's standard SAS and SATA interface operated through the motherboard's South Bridge chip, while new, fast disk drives like SSD use SATA Express through the PCI-e interface. While this new option helps meet the performance and capacity demands of varied workloads, servers will need SATA Express capabilities and SFF-8639 multifunctional connectors to take advantage.


Red Hat brings SOA to the cloud
JBoss Fuse Service Works provides additional tools to help administrators manage complex workflow environments that run on JBoss Fuse. It includes SwitchYard, which provides an service orchestration interface for building workflows and defining business logic. It provides tools for establishing and enforcing organizational policies, and exposing services so they can be found elsewhere in the organization.



Quote for the day:

"A culture of discipline is not a principle of business; it is a principle of greatness." -- Jim Collins

February 05, 2014

Software [in]security and scaling automated code review
As the tools have matured to cover a broad range of vulnerabilities, they have in general evolved for integration into a build process on a big build server. That means in some cases they may not be feasible for use at the developer desktop. Simply put, the industrial-strength tech eats a workstation alive. ...  If a developer has to tie up her development workstation for two to three hours to run a scan on a single build component, the result is that her productivity diminishes as she waits around for results.


Interview: The Need for Big Data Governance
There are three main ways bad data gets into systems, and they’re all essentially technology-agnostic. The first is during data migration. Before you go live on a new system, you will normally bulk load some information. If your initial data load contains poor quality data, it can be really expensive to fix. If you’re talking about an ERP system, it can break essential business processes like being able to bill customers. A big data project could lose credibility with the users if they see a lot of data issues. It’s simpler and cheaper to prevent bad data getting in in the first place.


British intelligence used DDoS tactics against Anonymous, Snowden documents show
The British spy agency GCHQ secretly waged war against the hacker collective Anonymous a few years ago, according to documents taken from the NSA by Edward Snowden and revealed late Tuesday by NBC. At the time, certain members of Anonymous were themselves waging war against British government institutions and various companies.


Audit committees increasingly uncomfortable about cyber threats
“Given the rapidly growing public, political and media profile of the cyber threat, it is very worrying that audit committee members feel more concerned now about the issue than they did a year ago,” said Stephen Bonner, partner at KPMG. “It shows that either companies are losing the battle against cyber criminals, or they are still not yet fully engaging with the threat. It is a difficult issue that takes many executives and non-executives out of their comfort zone. However, it is simply too big and fast-growing a risk for companies to tackle half-heartedly.”


Those many faces of fraud
The past few years have seen several headline-grabbing incidents of corporate fraud in India. These have not just tested the Indian ‘trust-based’ business framework, but also sent ripples across the business community and stock markets. In many ways, India woke up to the reality of fraud in the past few years. It realised that it was not a Western phenomenon, but a universal one. Greed is, after all, a human failing. Predicting a fraud before it occurs is, at least for now, the subject of science fiction.


Strategies and Code for Creating Fluent APIs
There are numerous ways to implement a fluent API, depending on the degree of control you want to maintain over the API, how many classes you want to be able to use it with, and how you want to extend your API. Here are your options. In an earlier column, "Implementing a Fluent Interface," I showed how to create a fluent API for a single class. However, there are other strategies that offer more flexible solutions.


When No One Is Just a Face in the Crowd
“Just load existing photos of your known shoplifters, members of organized retail crime syndicates, persons of interest and your best customers into FaceFirst,” a marketing pitch on the company’s site explains. “Instantly, when a person in your FaceFirst database steps into one of your stores, you are sent an email, text or SMS alert that includes their picture and all biographical information of the known individual so you can take immediate and appropriate action.”


Senate cybersecurity report finds agencies often fail to take basic preventive measures
“Almost every agency faces a cybersecurity challenge,” said Michael Daniel, special assistant to the president on cybersecurity policy. “Some are farther along than others in driving awareness of it. It often depends on whether they’ve been in the crosshairs of a major cyber incident.” ... The report concluded that the department had failed even to update essential software — “the basic security measure just about any American with a computer has performed.”


SHA-1 to SHA-2: The future of SSL and enterprise application security
Organizations should push ahead with the upgrade to SHA-2 now and not hope for a last-minute reprieve despite the fact that no SHA-1 collisions have yet been found. The areas that will require the most work are legacy systems that make SSL connections, and software and hardware such as game consoles, phones and embedded devices that rely on hard-coded certificates. These certificates will all need to be replaced and have the software updated if they are unable to currently support SHA-2 encryption.


12 predictions for the future of programming
To help you prepare for -- or at least start contemplating -- a future that's screaming across the sky faster than we can see, we've compiled a dozen predictions about how the next five years of programming will shake out. Our crystal ball is very subjective, and some of the following conjectures might not prove universal. Some won't be fully realized in five years. Others are already true, but the extent of their truth is not as well-established or widely known as it will be fairly soon.



Quote for the day:

"Concentration comes out of a combination of confidence and hunger."-- Arnold Palmer

February 04, 2014

A Cost Analysis of Media Consumption using System Dynamics Modeling
Compare the heavily discounted cost of $3/GB for disk to the average price of 10¢ to 13¢ per GB for tape. Or in the case of our simulation and model, $102.9M for a disk architecture and $3.4M for a tape architecture. With a difference of more than 30x the cost for disk than tape, one needs to step back and consider if they really want to jump into the world of disk based backup without considering ways to lower the total cost of ownership. The fundamental cost in the average enterprise is the retention of data that is backed up. With altering the retention level of data backed up, we can effect an impact on the TCO.


Satya Nadella's to-do list: Here are the first 10 battles Microsoft's new CEO will have to fight
And now finally Microsoft has finally ended the wait by confirming that Satya Nadella is to be its new CEO. Nadella needs to get moving as soon as possible; after months of Microsoft's staff effectively treading water while waiting for a new chief to be appointed, he'll have an overflowing inbox and many decisions to make about the future direction of the company and its products. Here are some of the knotty interrelated issues Microsoft's new chief executive will have to struggle with sooner rather than later.


Top 10 Ways to Improve Your Cloud Career and IT Skill Set
New data center demands are creating a wide array of new types of specialists. Engineers become architects, programmers become cloud designers, and database administrators become data scientists! There are a lot of new and interesting options out there to help you push your career to the next level. To be successful in the IT and cloud arena you’ll have to optimizeyour existing skill set. With that, let’s take a look at 10 great ways you can accomplish this.


Predictive Analytics: Finding the Future in Big Data
Using PA to properly assess risks based on actuarial data and proven hypotheses can mean the difference between new product ROIs and catastrophic liability. Weather models forecasting everything from hurricanes to sea-ice melt allow scientists to measure the effects of climate change and illustrate future scenarios. Crime prevention, genomics, human and knowledge performance indicators, natural resource exploration, project management, and other disciplines have stakes in PA.


The Persistent Imbalance Between Supply and Demand for Software Development Labor
We're currently in the midst of another structural increase in the demand for software development labor, this time being driven by analytics and smart devices (the alleged "internet of things", from cars to coffee pots), with the odd halo application (e.g., wearable tech) thrown in for good measure. Every indication is that for the foreseeable future, demand for software developers will continue to increase at a rate faster than the supply of software developers available to develop it. What does this mean to the business of software?


Healthcare among most opportunistic use cases for boundaryless information flow improvement
In the healthcare landscape, and in other industries, there are a lot of players coming to the table and need to interact, especially if you are talking about a complex episode of care. You may have two, three, or four different organizations in play. You have labs, the doctors, specialized centers, and such, and all that requires information flow. Coming back to the methodology, I think it’s bringing to bear an architecture methodology like provided in TOGAF.


The Enterprise IT Infrastructure Agenda for 2014
Procurement of hardware, software, and services required to operate an enterprise environment is becoming more challenging for senior infrastructure managers. Even as more procurement spending is devoted to software, many infrastructure organizations continue to use techniques developed for hardware procurement. These techniques are not entirely effective given software’s product fragmentation and relatively high switching costs.


Despite Target data breach, PCI security standard remains solid, chief says
"Any time there's a breach it sheds a spotlight on what we do," Russo said. But instead of pointing fingers at PCI, there should be more focus on working collaboratively to address security issues in the payment card industry, he said. "Everybody is looking for a silver bullet," in the wake of the recent breaches, said Russo, who is scheduled to testify before Congress pn Wednesday on the issue. "As far as I know, no silver bullet exists. It's a combination of people, process and technology."


Debug / Inspect WebSocket traffic with Fiddler
This is my first time writing code project article. Thanks for your supports. I have recently written a project using SignalR, which supports HTML 5 WebSocket. However I cannot find good tools to debug or inspect WebSocket traffic. I know that both Chrome and Fiddler support inspecting the WebSocket traffic, but they are very basic. If you have very high volume of traffic or each frame is very large, it becomes very difficult to use them for debugging. I am going to show you how to use Fiddler (and FiddlerScript) to inspect WebSocket traffic in the same way you inspect HTTP traffic.


Mobile device management vs. mobile application management
Mobile device management and mobile application management are two of the more popular technologies for enabling secure smartphone and tablet use in the enterprise. They have different use cases, but some of their features overlap, and more vendors are combining the two technologies into single products. That means mobile device management vs. mobile application management isn't necessarily the discussion you should be having in your IT department.



Quote for the day:

"If you define your company by how you differ from the competition, you're probably in trouble." -- Omar Hamoui