February 23, 2014

Paper cuts: the NHS prepares to go digital
“This is about moving away from paper health and social care records towards an electronic system that will capture critical records and will allow patients and healthcare professionals to have access to their records.” Jones explained how a variety of projects were enabling staff to work more efficiently, including by allowing doctors to digitally request test results. He described implementation as “going well”, thanks in part to a procurement programme supported by a Department of Health (DoH) scheme. “We’ve been successful in securing a commitment from the Treasury through the Southern Acute Programme for funding a fully integrated EHR system,” said Jones, who added the trust is on target to become paperless within four years.


Google Eyes 34 Cities for Next Step in Gigabit Fiber Expansion
Google has chosen 34 cities across the U.S. as the next sites for possible expansion of its gigabit-speed Fiber Internet service. The cities encompass nine metro areas and include Salt Lake City; San Antonio; Nashville, Tennessee; Charlotte, North Carolina; clusters of cities around Silicon Valley, including Mountain View where Google has its headquarters; Atlanta; Portland, Oregon; Phoenix; and Raleigh-Durham, North Carolina.


Why Obama's 'Voluntary' Cybersecurity Plan May Prove Mandatory
The framework lists four different buckets - or "tiers" - for judging a cybersecurity plan, from "partial" to the most sophisticated "adaptive." The plan allows a stakeholder to assess its plan's effectiveness and set goals for which tier it wants to reach, while also encouraging progression toward higher buckets. NIST referred to the report as "version 1.0," indicating that it plans to issue future iterations, and the agency presented a "roadmap" of key areas where the framework could be revised.


The great hiccup
The problems began with the discovery of a flaw in Bitcoin’s code at the start of February. Bitcoin is, in effect, a giant shared transaction ledger, recording who owns each individual unit of the currency at any one time. Everyone must use the same copy of the ledger—known as the “blockchain”—to prevent the same coins from being spent twice. The flaw, known as “transaction malleability”, muddles up the ledger so that successful Bitcoin payments do not appear to have been made. This could make it possible for hackers to trick badly-coded software—such as the proprietary Bitcoin wallets used by some exchanges—into sending money repeatedly.


How Data Creates Customer Value: Q&A with Anthony Bosco
Adding that little something special is a way to differentiate—it creates stickiness. I’m not enamored of gimmicks or techie stuff, but I see technology as a lever in the innovation and betterment toolbox. Technology can do three things. It can drive internal efficiency, which may be where it got its start years ago. It can optimize our own supply chain which enhances our value proposition in the marketplace. And we can use it to work with customers in this betterment spirit, to augment their value proposition in the marketplace. The third of these is most important.


Google Maps Gets Massive Update: Five Features to Know About
Like it or not, Google Maps is about to look radically different. Over the next couple weeks, Google is rolling out a new version of its Web-based Maps that’s been redesigned and rethought in just about every way possible. Google announced these changes at a conference last May, and rolled out the change to 20% of Maps users in preview mode. Now, the rest of the world’s Maps users are getting the new look. Try not to be shocked by the new design. The white bar on the left is gone—all you see at first is a map that consumes the entire browser window, with a simple white search box in the top left corner.


Is a restricted Internet our 21st century Prohibition? It’s starting in Britain
For all the positives offered by this free and open system, there is one critical problem with this kind of freedom, and that is the inability to control completely what type of content is distributed across the internet. For every 10 communities trying to make a positive impact on the world via the web, there is a manifesto filled of hate and bile. For everyone sharing pictures of their family holiday there is minority sharing the most disturbing and vile images that you can imagine. And between these polar opposites, there are many, many shades of grey.


How to Evolve Your Approach to Analytics in an Increasingly Social World
Social media analytics has previously focused on the content of posts – e.g., text of a Tweet – to measure consumer sentiment. However, to get actionable insight, companies need to take analysis further. Though it’s not the only step, investigative analytics can be a great first step for more complex analysis at massive scale. It allows non-data scientist users to “play” with social media data by asking iterative questions in near real time, regardless of data volume. Maybe marketing is monitoring Facebook and, thanks to a new query, they’ve decided to serve up a location-based coupon.


Data privacy, machine learning and the destruction of mysterious humanity
Our brains evolved to assess trade-offs best in the face of immediate, physical needs and threats. Should I run from that predator? Absolutely. Unfortunately, we still have these same brains. That’s why the camel crickets in my crawl space make me flip out, but giving my kids’ data to Disney World feels perfectly acceptable. Second, most of us feel that giving our data over to a private corporation, like Disney or Facebook or Google, has limited scope. They can only touch us in certain places (e.g., their parks, their websites). And what’s the worst those parks and websites are going to do? Market crap to us.


Embedded Analytics and Statistics for Big Data
Embedded analytics and statistics for big data have emerged as an important topic across industries. As the volumes of data have increased, software engineers are called to support data analysis and applying some kind of statistics to them. This article provides an overview of tools and libraries for embedded data analytics and statistics, both stand-alone software packages and programming languages with statistical capabilities.



Quote for the day:

“Always do right. This will gratify some people and astonish the rest.” -- Mark Twain

February 22, 2014

Everything old is bad and antiquated and not everything new is shiny and good.
The world's leading companies have come to realize that only when their customers are successful, will they be successful. In pursuit of their market leadership not only they need to spend time to look inside their business to know how things are getting done but also look outward to get deep understanding of their customers. Process has indeed come a long way from it humble routes amidst the early industrial revolution and Adam Smiths ‘Wealth of Nations’.


5 ways to encourage Business Transformation in Enterprise Architecture
We try and consistently fail to change the attitudes of our peers - opposing mindsets are now a common feature when implementing business transformation. It has long been the mission of EA practitioners to get the right people motivated in adopting a fully functional EA strategy. We've delved into the perspectives of the Enterprise Architecture industry and uncovered precisely this fact: EA practitioners just don't get the support of the CIO or executive management. Getting the 'buy-in' from stakeholders has become the main hindrance when asserting implementation


Hacking the Data Science
A quick thought that comes to mind when thinking about the image that shows data science as three overlapping circles. One is Business, one is statistical modeler and one is technology. Where further common area shared between Technology, Business and statistician is written as data science. This is a great representation of where data science lies. But it sometimes confuses the viewer as well. From the look of it, one could guess that overlapping region comprises of the professionals who possess all the 3 talents and it’s about people.


6 Out of 10 Android Apps a Security Concern
Webroot found that Android poses a greater security risk than iOS. Webroot identified a 384 percent increase in total threats to Android devices over 2012, and found more than 40 percent of the Android apps analyzed were classified as either malicious, suspicious, or unwanted. By contrast, more than 90 percent of the million-plus iOS apps that Webroot assessed were tagged as "benign," with seven percent marked as "trustworthy," and only a meager one percent identified as "moderate" risks. The lower instance of suspicious or malicious apps is a function of the vetting process developers must go through before apps are made available in the Apple App Store.


Why Your Car Won’t Get Remote Software Updates Anytime Soon
Software is rapidly taking over not only the entertainment console in cars, but also basic functions such as steering, braking, and acceleration, as more cars come with features such as adaptive cruise control and automated parallel parking. This can make it easier to diagnose and fix problems, but it also increases the risk for software bugs or even malicious attacks that might cause serious injury. ... to potentially improving safety by delivering fixes faster, remote updates could save automakers money.


The Kanban Survivability Agenda
The survivability agenda’s values of understanding, agreement and respect demand commitment, both initially and ongoing. These leadership disciplines are key to the impactful adoption of the Kanban Method - they’re protective of the pursuit of organizational learning that takes place inside the boundaries of the change initiative and they’re catalytic at its outward interfaces. Ostensibly about fitness – fitness relative to the competitive environment and fitness for purpose – the survivability agenda is really cultural.


How to Design Test Cases Using State Transition Testing Technique?
State transition testing is a form of Dynamic Testing Techniquethat comes in use when the system explained as a finite number of states and the evolutions between the states is ruled by the rules of the system. Another use of this technique when features of a system are characterized as states that converts to other state, this transition is explained by the method of the software


3 misconceptions about BDD
BDD has been often misunderstood among developers, QAs and even BAs. We often hear of teams saying that their project is using BDD, but when we check it out, it turns out to be using only a BDD tool for test automation - and not the BDD concepts itself. So in the end, we hear people arguing about the tools, and not about the ideas that inspired the creation of those tools. The output of that is a bunch of complaints that we see in blogs all over the internet - people that start to reject the whole idea behind BDD, only because they have tried to use a tool without first changing their attitude towards software development.


Continuous Integration: Scaling to 74,000 Builds Per Day With Travis CI & RabbitMQ
Travis CI relies heavily on third-party infrastructure. This allows us to focus on shipping new features and platform improvements that make our users happy. Working with 3rd party infrastructure also has challenges. For example, we’ve been using a hosted RabbitMQ setup for more than two years now. RabbitMQ has some unique properties for handling overly ambitious message producers in the system. When one or more processes on one virtual host produce more messages than the system can handle, RabbitMQ can block or limit other producers and consumers. Much to our frustration, this affected us a few times.


Adopting a Professional Compass for Information Architecture
With an IA compass in place, expressing the value that information architecture delivers to a business becomes clearer. The IA compass that I’ll describe is absent of theoretical and technical rhetoric and focuses on a greater good. This greater good is one that is most likely to resonate with our business and marketing colleagues. While it is important that they acquire a general understand of information architecture, they are more interested in how information architecture fits into their business model and delivers value.



Quote for the day:

"Pay no attention to what the critics say; there has never been set up a statue in honor of a critic." -- Jean Sibelius

February 21, 2014

Cyberattacks fallout could cost the global economy $3 trillion by 2020
That is the report's main finding—the global economy has yet to mount an adequate defense against the rise of cyberattacks. McKinsey and the World Economic Forum conducted a survey last year of 200 enterprises, tech vendors, and public sector agencies. The two other findings of the report are that executives in enterprise tech have a consensus on the seven best practices for cyberresiliency, and that cybersecurity is a CEO-level issue.


Who Can You Trust?
Contrary to common belief, integrity isn’t a stable trait: Someone who has been fair and honest in the past won’t necessarily be fair and honest in the future. To understand why, we need to abandon the notion that people wrestle with “good” and “evil” impulses. Except in cases of serious psychopathology, the mind doesn’t work that way. Rather, it focuses on two types of gains: short-term and long-term. And it’s the trade-off between them that typically dictates integrity at any given moment.


Google's Project Tango Sees All
Project Tango phones include a vision processing system, a depth sensor, and a motion tracking camera, along with the gyroscopes and orientation sensors found in other smartphones. They can be thought of as something like a mobile version of Microsoft's Kinect system. ... Given Project Tango phones, developers could create apps that, for example, tracked player movements accurately enough to determine whether a virtual laser blast from one player hit another player or an obstacle.


Microsoft's Free Security Tools - Summary
The series highlights free security tools that Microsoft provides to help make IT professionals' and developers' lives easier. A good tool can save a lot of work and time for those people responsible for developing and managing software. In the series we discuss many of the benefits each tool can provide and include step by step guidance on how to use each. Below is a summary of the tools covered in the series and a brief overview of each.


How Philips Altered The Future of Light
Listening to Philips executives map out the future can lead to a realization: Older digital technologies--the Internet, for instance, or smartphones--accentuate the impact of newer digital technologies, such as the LED. This is most apparent in a product like Hue. Internet connectivity makes the product controllable by smartphone, but also endows it with a vast capacity for improvements. "You could buy it now and it will keep getting better," observes Yianni, "because the evolution is now more in the software and in the app."


Privacy Threats You Need to Know About
A good understanding of the privacy threats is an important factor for preventing privacy violations. In order to provide such an understanding, this article discusses ten important privacy threats, namely government surveillance, data profiling, hacking of bank institutions, hacking of software companies, hacking of government health care websites, fake online complaints, using Facebook for background checking, hacking of delivery drones, hacking of cloud computing servers, and hacking of Google Glass.


Alternatives to RESTful API for accessing object storage
There are downsides or tradeoffs with this approach as well. First and foremost, there is greater latency, leading to longer response times. Anytime one interface must be converted to another, there will be more latency. In addition, the NAS experience is not identical. This is because the software conversion function is an interface convenience, not a replica of a NAS system with all of its features. The iSCSI response times also tend to be slower than native iSCSI storage (latency again) and are not accessible any other way than as iSCSI blocks.


Oral-B has a connected toothbrush. You don’t need it.
Oral-B says that the brush has a Bluetooth radio and will send your brushing data to you via an iOS or Android app, but it will also accept programming so you (or your dentist) can tell the brush where you want to spend the most time. The app also will show you news and weather or whatever while you are brushing, making those two minutes fly by. This would be so much cooler if the brush played the information while you brushed — the way my daughter’s musical toothbrushes play Selena Gomez songs.


Istanbul-based Finansbank manages risk and security using HP ArcSight, Server Automation
BriefingsDirect had an opportunity to learn first-hand at the recent HP Discover2013 Conference in Barcelona how Finansbank extended its GRC prowess -- while smoothing operational integrity and automating speed to deployment -- using several HP solutions. Learn how from a chat with Ugur Yayvak, Senior Designer of Infrastructure at Finansbank in Istanbul. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.


From Imperative Programming to Fork/Join to Parallel Streams in Java 8
It is considered the largest language change since the advent of Java 20 years ago. To find detailed practical examples of how you can benefit from these features refer to the book Java 8 in Action: Lambdas, Streams and Functional-style programming written by the authors of this article and Alan Mycroft. These features enable programmers to write more concise code, and additionally they let programmers benefit from multi-core architecture. In fact, writing programs that execute gracefully in parallel is currently the preserve of Java specialists.



Quote for the day:

"Everyone needs to be valued. Everyone has the potential to give something back." -- Princess Diana

February 20, 2014

Debunking four myths about Android, Google, and open-source
The Guardian published a story, which they have since taken down, spreading FUD about Google, Android, Linux, open source, and licensing. The paper later published another article trying to get the Android facts right, but, well, they still don't. ... When all the MADA provisions are taken together, Edelman argues, they tie Google's apps into a near seamless whole.


How SDN and NFV simplify network service chain provisioning
SDN or NFV service chaining also makes the process of network upgrade simpler. Communications service providers, for example, have networks that are geographically distributed, so upgrading equipment requires travel. In addition, a single error can bring down the entire network and cause outages on interconnecting providers' networks. But with SDN and NFV, providers can create new chains that increase the efficiency and the capacity of their networks without radically changing hardware.


Gartner Says Master Data Management Is Critical to CRM Optimization
"Over the last several years, CRM software sales have outstripped overall IT spending," said Bill O'Kane, research director at Gartner. "CRM leaders must understand the benefits of the MDM discipline to CRM and make it part of their CRM strategy. MDM is critical to enabling CRM leaders to create the 360-degree view of the customer required for an optimized customer experience."  Mr. O'Kane said that organizations are moving to a more integrated CRM approach that focuses on the customer experience through improved customer engagement, across marketing, sales, customer service, e-commerce and all other customer-facing channels.


The Women Behind The Data
The buzz being made by Big Data has clearly made way for women wanting to get started in a data-driven field. Opportunities in Big Data are attracting women specializing in IT, data science, data management, software development and anything else data related. This could be because Big Data is a fairly new industry which has currently been met with great success. All the hype surrounding Big Data has made careers within this sector more appealing, especially for women looking to exercise their mathematical and analytical skills.


Pulling the Reins on Data Breach Costs
"That leaves you with two options," says David Mortman, chief security architect and distinguished engineer, Dell. "You can work to reduce your chances of a breach. Second, because breaches do happen, you can protect yourself from additional litigation due to a breach, says Mortman. And this is where state law comes into play: they ultimately determine what constitutes due care, and typically when an organization is breached and is following due care they are not as exposed to successful lawsuits.


Fashion house Paul Smith steers a hybrid path to IT excellence
"Agility and continuous innovation are also key measures and I would like to be in a position to be proactive," he says. The role of IT has changed over the past decade, says Bingham, and has become a way of delivering business strategy.  "IT used to be a necessary evil. While everyone needed IT, it was a tactical service for Paul Smith’s business. Now I think there is a seismic shift and IT is regarded as a strategic service to grow the business," he says. "IT is now a crucial element of the business and a strategic supporter and enabler."


Cisco fixes flaws in several products
The vulnerability addressed in Cisco Unified Computing System (UCS) Director stems from a default account with root privileges that gets created during installation. "An attacker could exploit this vulnerability by accessing the server command-line interface (CLI) remotely using the default account credentials," which would provide the attacker with full administrative rights to the system, Cisco said in an advisory. The vulnerability was addressed in Cisco UCS Director Release Hotfix 4.0.0.3.


Cloud storage appliances: Backup and recovery made simple
OK, now that we're left with just the adults in the joint, let me put this in very simple terms that I am sure any stressed out, overworked CIO or CTO can understand: Your storage is very expensive. Like many organizations, you are probably always on the verge of having to buy another frame, another chassis, and trays of drives because you've got VM and filer sprawl. And the guy or gal who has the authority to sign the purchase orders to get you those new frames, chassis, network infrastructure, et cetera, likes to say no a lot.


10 mistakes to avoid in your disaster recovery planning process
Don't make your disaster recovery planning process even harder than it is by trying to do too much or cutting corners. Careful planning is your best bet for a successful recovery. At the start of the new year, many IT folks (and perhaps a few business managers) resolve to take steps to prevent avoidable interruption events and to cope with interruptions that simply can't be avoided. In short, they decide to get serious about data protection and disaster recovery planning for business IT operations.


SQL Server Security Checklist
There are many security related settings in the Microsoft SQL Server and you should also consider setting up processes to ensure that the security is maintained in the future. The security related tasks can be divided into four main categories: physical security, operating system level security, SQL Server configuration and user management. You should protect your server physically, have a secure OS and then you can start thinking about your SQL Server.



Quote for the day:

"The most important thing in communication is hearing what isn't said." -- Peter Drucker

February 19, 2014

Marginally Useful
Smith believes that cryptocurrencies will have wide application across business and culture, including both banking and online advertising. For banks, Bitcoin is “just a new source of money,” he suggests. “Banks are very hungry to advance their value through technology.” It’s easy to imagine, say, HSBCoin, or BarclaysBucks, giving investors who want choice in the currencies they use the services of a trusted financial brand.


Breaking Bad Leadership Habits
Despite being armed with greater access to knowledge and training than ever before, executives still need to be able to integrate that knowledge into their behaviour back at work. To do so, they must go through three major steps. First, one must identify a need for improvement. When we feel satisfied with our performance in a particular area, we don’t devote time and energy to improving it. The first step is hence to move from Unconscious Incompetence to Conscious Incompetence.


Preparing for the Future of AI, Where Robots Can Learn and Ask Humans For Help!
In a world full of self-driving cars, flying drones, and other robots, daily interactions with artificial intelligence will have a profound effect on how we live our lives. Elemental video scientist Boonsri Dickinson visited Carnegie Mellon robotics pioneer Maneula Veloso to talk about the science behind her robotic creations and the many years she has spent bringing autonomous robots to life. For video see this link and embedded below:


Why Big Data In The Enterprise Is Mostly Lip Service
For every Amazon, Apple, Facebook, Twitter, Netflix, and Google, I would wager that thousands of midsized and large organizations are doing nothing with big data beyond giving it lip service. That is, the fact that a CXO has heard of big data is hardly to the same thing as her company actually doing anything with the massive amounts of unstructured data flying at us faster than ever. This begs two simple yet critical questions: Why the lack of adoption? And how can organizations overcome the obstacles currently impeding them?


In praise of the humble smart plug: Are outlets the gateway for the internet of things?
There are two other considerations here: measuring energy consumption and determining location. Most smart outlets from big names like Lowes and Belkin as well as smaller startups like PlugAway or Parce now have some kind of energy measurement feature, which might be useful in figuring out if your TV is a high-cost plugged-in device for which you should cut off access to power when it’s not on. Some, like Parce, offer algorithms that will turn it off for you.


Intel stresses in-memory computing with 15-core server chip
Applications tied to in-memory computing such as databases will get a boost with new throughput features and memory capacity of 1.5TB per socket. The Xeon E7 v2 chips, code-named Ivytown, will run at clock speeds between 1.4GHz and 3.8GHz, and draw between 40 watts and 150 watts of power. Intel is shipping 20 new chips in that family with between two and 15 cores. The new E7 chips are two times faster than their predecessors released last year, said Diane Bryant, senior vice president and general manager of Intel's Data Center Group, during a webcast.


Where Lean Startups and Design Thinking Meet
Many lean startup practitioners have a tendency to treat everything as “pivotable.” This can be dangerous because it turns lean startup into a mechanistic trial and error exercise. The lack of intent makes it easy to get lost. To avoid this fate, it’s helpful to anchor lean techniques around an observed human need, which is supplied by design thinking. You never want to lose sight of the need you’re designing for as you undertake the lean startup.


Mobile devices are uprooting your CRM business processes
Mobile is disrupting today's business processes, which should prompt all of us to rethink how we work: Are there more efficient and effective ways to work that incorporate mobile? How do mobile devices and applications enable us to gather the most accurate and up-to-date knowledge and to use it? Let's consider some ways in which mobility has sparked needed change in our existing tasks.


Digital Independence: NSA Scandal Boosts German Tech Industry
Critics have begun warning of the "Balkanization of the Internet" and doubt whether merely storing data on local servers will protect it from American intelligence. ... As a result, companies like Deutsche Telekom have demanded that data be processed within Europe to the degree possible. But the idea, known as "Schengen Routing," has been received with skepticism by European Commissioner for Digital Agenda Neelie Kroes. "It is not realistic to contain data within Europe. You cannot put up border controls. That would destroy the openness of the Internet," she told SPIEGEL.


SQL Server SEQUENCE Basics
SQL Server now has the ANSI/ISO Standard CREATE SEQUENCE statement. Hooray! The bad news is that most programmers will not be aware of the significance of the underlying math. A SEQUENCE is not an IDENTITY. That propriety feature in T-SQL is a table property inherited from the old Sybase/UNIX days. It counts the number of insertion attempts, not even successes, on one particular machine. This goes back to how files were managed on UNIX systems in the 1970s. In those systems, you needed record numbers to locate the data, so T-SQL exposed this count as IDENTITY.



Quote for the day:

"Giving connects two people, the giver and the receiver, and this connection gives birth to a new sense of belonging." -- Deepak Chopra