October 25, 2014

A Closer Look at CloudFlare and Incapsula: Next Generation CDN Services
CloudFlare was among the first to offer a free CDN service, in essence sparking this revolution. Incapsula, spun off from security giant Imperva, upped the ante by imbuing the CDN platform with security-oriented technologies. Motivated in part by their own competition, the relentless innovation of these companies is advancing the CDN space forward in leaps and bounds. Today, this innovation is also ushering in a new trend of using cloud-based services to replace security and availability enterprise-grade appliance.


A first look at Distributed R
The primary use case for the Distributed R software is to move data quickly from a database into distributed data structures that can be accessed by multiple, independent R instances for coordinated, parallel computation. The Distributed R infrastructure automatically takes care of the extraction of the data and the coordination of the calculations, including the occasional movement of data from a worker node to the master node when required by the calculation. The user interface to the Distributed R mechanism is through R functions that have been designed and optimized to work with the distributed data structures, and through a special “Distributed R aware” foreach() function that allow users to write their own distributed functions using ordinary R functions.


Why companies that rely on open-source projects must insist on a strong code of conduct
While companies may be reticent to dictate the behaviors of the open-source community for fear that doing so will stifle innovation or cause members to question the motives of their corporate overseers, if a situation gets out of hand, it’s wise for companies to take some sort of action so that its open-source talent doesn’t leave and tensions don’t escalate. One way to combat bad behaviors and create some semblance of order is to create a strong code of conduct, which is a set of guidelines that dictates what the community believes to be acceptable behavior. First developed and popularized by the Ada Initiative


Managing Complexity: The Battle Between Emergence And Entropy
But complexity has a dark side as well, and companies like JP Morgan, IBM and Airbus often find themselves struggling to avoid the negative side-effects of their complex structures. These forms of “unintended” complexity manifest themselves in many ways – from inefficient systems and unclear accountabilities, to alienated and confused employees. So what is a leader to do when faced with a highly complex organisation and a nagging concern that the creeping costs of complexity are starting to outweigh the benefits?


Ensembles to Boost Machine Learning Effectiveness
Ensemble-based crowdsourcing for machines has many practical applications. Next-best action—the heart of decision automation and recommendation engines—rides on the best-fit model.3 Quite often, so do real-world experimentation and A/B testing. Notably, Kaggle competitions have been won by ensembles of independent decision-tree models.4 And then there are the computational sciences—for example, physics, econometrics, and so on—in which ensemble methods support independent verification of findings across distinct models developed by different researchers using different algorithms and approaches.


So, what’s in store for the cloud in 2015?
In 2015, we will become better at running the numbers for the cost benefit analysis of cloud-based platform usage within the enterprise. We’ll hear more about the “cost of risk,” value of resilience, service reuse benefits, and a lot of things that most enterprises never considered until they got the bill. Third, we’ll see the continued fall of the private cloud, yet another very easy prediction to make. Just follow the trend. bPrivate cloud was once the way that many enterprise software players wanted you to go, because it allowed them to continue selling on premise software systems. These days, most enterprises opt for public cloud over private. The reasons are obvious.


Why Google wants to replace Gmail
One key feature of Inbox is that it performs searches based on the content of your messages and augments your inbox with that additional information. One way to look at this is that, instead of grabbing extraneous relevant data based on the contents of your Gmail messages and slotting it into Google Now, it shows you those Google Now cards immediately, right there in your in-box. Inbox identifies addresses, phone numbers and items (such as purchases and flights) that have additional information on the other side of a link, then makes those links live so you can take quick action on them.


Things Boards Should do About Cyber Security Now
This week, The Wall Street Journal sat down with two top-tier experts in cybersecurity and risk management. Raj Samani, CTO EMEA at McAfee; and Stephen Bonner, Partner in the Information Protection and Business Resilience team at KPMG, laid out the key issues boardrooms need to look at to secure their company’s data and reputation.


What's keeping data science from playing a more central role in public policy?
You can be cynical about this or realistic: data science, by itself, is an ineffectual governance tool if it lacks strong champions who can wield it to get things done in the legislative, executive and judicial branches. Decision science is just as important as data science: being able to identify the myriad factors that drive policymakers, and to use this understanding to identify where data-driven methods might have some potential sway. One species of decision scientist, the political scientist, spend their careers dissecting these factors in diverse policy arenas.


How to Effectively Map SQL Data to a NoSQL Store
The SQL Layer is a sophisticated translation layer between SQL and the key-value API. Starting with a SQL statement, it transforms it to the most efficient key-value execution, much as a compiler translates code to a lower-level execution format. It is compliant with the ANSI SQL 92 standard. Developers can leverage the product in combination with ORM’s, a REST API, or access it directly using the SQL Layer command line interface. From a codebase point of view, the SQL Layer is completely separated from the Key-Value Store. It communicates with the Key-Value Store using the FoundationDB Java bindings.



Quote for the day:

"So much of what we call management consists in making it difficult for people to work." -- Peter Drucker

October 24, 2014

Ford to Add Pedestrian Detection to Its Cars
Like other automakers, Ford is also experimenting with more complete automation. Its bigger Detroit rival, General Motors, plans to offer a Cadillac by 2017 that can drive automatically on freeways. But Ford’s new system also reflects a more incremental and cautious approach, in contrast to Google, which has committed to delivering full autonomy. Google’s latest prototype vehicles originally came without a steering wheel and didn’t feature brakes that were operable by its human passengers, although it was forced to add such controls so it could legally test the cars on the road.


Congratulations Hadoop, You Made It–Now Disappear
That’s not to say that there will no longer be a need for geeky technologies like Pig and Sqoop and Flume–or for Teradata, EMC, or Oracle, for that matter. In fact, Cloudera just announced partnerships with the first two. And there’s more geeky technology on the horizon, particularly with Apache Spark, which is gathering huge momentum among developers and ISVs because it enables them to build big data analytic workloads without the complicatedness of first-gen Hadoop. But even if Spark and the rest help abstract away some of the underlying complexity, the complexity is still there under the covers.


Be Careful! Backups Can Bite You!
Every time you perform a backup in SQL Server, you must specify the target media for the backup. This is called a media set. It is called a set, because you can specify multiple backup devices. A media set is an ordered collection of backup devices (tapes, disk files or Azure Blobs) that contains one or more backup sets. A backup set is the content that is added to a media set by a successful backup operation, striped between the backup devices in the media set.The problem lies with the backup and restore operations. Before I explain what happened, let me give you a brief explanation of the way SQL Server handles backup operations…


The Role of the Technical Architect in Development
Responsibility for the quality and effectiveness of code is, of course, shared by the whole team; however, an architect needs to challenge the team and help it to implement even better code which meets industry standards. This can be achieved by evangelising and promoting good practises (SOLID, KISS, DRY), tools (FxCop, StyleCop), metrics - or just by giving a good example in doing regular development tasks. This last aspect is very important because it helps the architect to stay close to the team and technical nuances as well as allowing him to double-check how well the proposed design materialises in code.


7 Big Data Blunders You're Thankful Your Company Didn't Make
Big data, especially the right data, has the potential to completely transform how companies communicate with their customers and fans. With new technology and tools like sensors and beacons, we can track every aspect of a customer’s online and offline interaction with a brand, and use that data to customize and curate content and promotions. Many customers are willing to share their data with brands in return for personalized experiences and offers that offer value while still being respectful of personal boundaries.  In a recent survey by SDL, 79% of respondents said they’re more likely to provide personal information to brands that they “trust.”


AVG adds identity services to Cloudcare platform
The latest addition - identity-as-a-service (IDaaS) - is designed to provide managed service providers with an option of secure sing-on to monitor and manage their customers. Mike Foreman, AVG's general manager, SMB, said that it was responding to market needs, "to help MSPs grow their businesses further by enhancing the levels of protection and control built in to their customer services". “We know that with the rapid adoption of mobile, BYOD and Cloud applications customers will require additional expertise from partners to help control and manage all their users’ applications and data. We are listening," he added.


World's Wireless Record Breaks 40 Gbit/s
"We have designed our circuits with very high bandwidth, greater than 30 GHz, in an advanced semiconductor process -- 250 nanometer DHBT [double heterojunction bipolar transistor] with four metal-layers offered by Teledyne Scientific of Thousand Oaks, Calif.," Zirath told us. The team has been working on this invention for over a decade, finally pulling all the pieces together this year. "We started research on millimeter-wave transceivers about 12 years ago. We have also been focusing on high-data-rate transmission research for over six years. Over these years of hard work, we have gradually built up a knowledge base from many people's results.


Will Free Data Become the Next Free Shipping?
Those rising costs mean companies trying to deliver products or services to mobile devices face an extra hurdle: Not only do they have to sell potential users on the idea, they also have to convince them it’s worth the hit to their data plans. A new service launching this week called Freeway allows users of AT&T smartphones to access a number of sites, including StubHub.com and Expedia.com, data free. Users of the app, which is made by a Seattle-based company called Syntonic, can also watch a trailer for the independent film “Frank vs. God” without it counting against their data plan.


Who Makes Your Health IT Decisions?
Modern IT governance embraces this by placing key IT decisions in the hands of those clinical and operational partners. If your chief medical officer, your chief nursing officer (CNO), your director of patient financial services, and your health information management director have the final say about your IT budget, it changes the game. Now they have to understand the value of IT and choose the initiatives that make sense. Your CIO and IT staff have to translate IT arcana into language that makes operational sense and generate questions that have operationally focused answers. This isn't wasted time. It's critical engagement work that makes sure that scarce organizational dollars wind up in the right place and in the right hands to drive the mission of the health system.


Going beyond the PC and the tablet: How to be authentically digital
We're already starting to use elements of machine learning in our day-to-day lives, with cloud scale AIs adding context to our device interactions. Both Google Now and Microsoft's Cortana are able to use location as a tool for adding context to a query - so what if we could use that context in a digital workflow? It's easy to imagine a near future hybrid of Storyteller and Sway, where our building site surveyor is photographing work in progress on a building retro-fit. He takes a series of photographs, which are automatically wrapped as a report using real-time speech recognition to convert his spoken notes into captions.



Quote for the day:

"If you want to go fast, go alone. If you want to go far, go together." -- African Prover

October 23, 2014

Generic pagination in C# for .NET WebAPI
The idea is really simple, and it's not a lot of code, but it's guaranteed to save you time in your next .NET WebAPI project. It's built with Entity Framework in mind, but it will work with any IQueryable collection. We use IQueryable because at the time of pagination, you should not have executed your query yet in most cases. Otherwise you would be fetching the full list of items before just returning a few of them, rather than fetching only those few to begin with. Of course if you need to fetch the whole list (to perform a calculation on each result perhaps) you can do that as well and simply cast the list AsQueryable() when you pass it to the pager.


How to Design for Discovery
Disruptive vendors focus on providing tools that facilitate discovery by design; they provide tools and technology solutions that make the end user more independent. Yet, self-sufficiency doesn’t happen in a silo. True discovery tools provide users the ability to connect to large volumes of new data and easily join different data sets together to filter, query, and visualize to explore data in detail without choking the system or relying on IT. Navigating the “new breed” of truly disruptive discovery tools means we must concentrate first and foremost on the elements that make a tool designed for discovery – with a robust, agile IT-independent and user-centric approach that has better access to data, agile high-performance,


Abandoned subdomains pose security risk for businesses
The risk to website owners depends on what can be done on a third-party service once a domain is pointed to it. If the service allows users to set up Web pages or Web redirects, attackers could exploit the situation to launch credible phishing attacks by creating rogue copies of the main website. In an attack scenario described by Detectify, a company might set up a subdomain for use with an external support ticketing service, but later close its account and forget to delete the subdomain. Attackers could then create a new account with the same service and claim the company’s subdomain, which already has the needed DNS settings, as their own, allowing them to set up a fake website on it.


Capitalizing on the data driven revolution
Despite the potential of big data, managing the massive amounts of data generated by customers and enterprises can be overwhelming. CMOs are constantly hearing about how they must use data to evaluate their marketing campaigns, operations managers are well aware that the use of data can optimize their supply chain, and finance executives are clamoring for ways to use analytics to realize cost savings. However, many organizations don’t know where to start or are stuck at an unsatisfactory halfway point.


Gmail’s New Inbox App Puts the Important Stuff on Top
Like-kind messages are grouped together in bundles so you can easily sort through a collection of messages quickly. The “social” and “promotions” tabs found in Gmail are default bundles in Inbox. You can tap into a “promotions” bundle, glance over all the companies who’d like to sell you stuff, and if nothing jumps out at you, swipe the entire collection of emails away and out of your view (doing this can archive or delete your emails in both Inbox and Gmail, depending on how you set up the app). The goal is that you’ll be able to open Inbox up and see a stream you can quickly browse through, acting on what you want and discarding the rest.


Happy 10th Birthday, Selenium
Selenium as a technology is now 10 years old. ThoughtWorks is proud to have created and open-sourced what is now the defacto-standard for cross platform cross browser web-app functional testing. We’re also proud to have released it as open source for the greater good. In honor of its 10th birthday, we put together the below timeline. Here’s to another 10 successful years.


U.S. national security prosecutors shift focus from spies to cyber
As part of the shift, the Justice Department has created a new position in the senior ranks of its national security division to focus on cyber security and recruited an experienced prosecutor, Luke Dembosky, to fill the position. The agency is also renaming its counter-espionage section to reflect its expanding work on cases involving violations of export control laws, Carlin confirmed in an interview. Such laws prohibit the export without appropriate licenses of products or machinery that could be used in weapons or other defense programs, or goods or services to countries sanctioned by the U.S. government.


Lessons in cybersecurity launched for schoolchildren
Ken Mackenzie, head of at Sedgehill School, said that presenting students with the opportunities to expand their digital skills was one of the key reasons why the school signed up. “Students at our school may live in London but they don’t necessarily experience London in the same way that students from more affluent backgrounds would. We feel computing is a particular strength at the school and we work hard to make sure we are presenting students with a full range of opportunities.” However, Mr Mackenzie also stressed that, aside from enhancing digital skills, the focus on careers was one that appealed to the school.


Sweat and a smartphone could become the hot new health screening
Heikenfeld says future applications for the patch could involve drug monitoring. "A lot of drug metabolites come out of sweat, so by using this technology, doctors can help patients take drug dosages more evenly. Our current methods, often based on age or body weight, are extremely crude when you think about all the side effects listed on the warning labels." "Ultimately, sweat analysis will offer minute-by-minute insight into what is happening in the body, with on-demand, localized, electronically stimulated sweat sampling in a manner that is convenient and unobtrusive," Heikenfeld concludes in the article.


Regulation on cloud security may spur SaaS use in health care
"The role of government is to move toward that transparency and data sharing," he said. Governments could also pass legislation that gives people more access to the data companies have collected on them and the ability to control it, such as correcting wrong information, said Ralph Zottola, CTO of the research computing division at the University of Massachusetts. "People are smart and are willing to participate but they need to feel they're not being abused," he said. This applies to all industries, not just health care, he said.



Quote for the day:

"A good objective of leadership is to help those who are doing poorly to do well and those who are doing well to do even better." -- Jim Rohn

October 22, 2014

8 cutting-edge technologies aimed at eliminating passwords
In the beginning was the password, and we lived with it as best we could. Now, the rise of cyber crime and the proliferation of systems and services requiring authentication have us coming up with yet another not-so-easy-to-remember phrase on a near daily basis. Is any of it making those systems and services truly secure? One day, passwords will be a thing of the past, and a slew of technologies are being posited as possibilities for a post-password world. Some are upon us, some are on the threshold of usefulness, and some are likely little more than a wild idea.


The Software-Defined Data Center: Translating Hype into Reality
Software-defined technologies are driven by virtualization, an abstraction layer which uses hypervisors and virtual machines to organize and manage workloads in new ways. Provisioning virtual resources with software makes it easier to scale applications and use hardware efficiently. Software-defined networking holds the promise of reducing costs by shifting network management task to commodity servers rather than expensive switches. It’s a new world, with major implications for infrastructure. Virtual machines make it easier to move workloads from one location to another, a capability that unlocks a world of possibilities.


'Internet of things' data should be 'treated as personal data', say privacy watchdogs
"When purchasing an internet of things device or application, proper, sufficient and understandable information should be provided," the declaration said. "Current privacy policies do not always provide information in a clear, understandable manner. Consent on the basis of such policies can hardly be considered to be informed consent. Companies need a mind shift to ensure privacy policies are no longer primarily about protecting them from litigation." The declaration outlined the DPA's backing for new technology that accounts for privacy by the way it has been designed. The concepts of 'privacy by design' and 'privacy by default' "should become a key selling point of innovative technologies", it said.


Why You Should Kill Your Employee of the Month Program
While rewards and recognition programs are designed with the good of employees, teams, and the company in mind, they tend to backfire for a simple reason. When you raise one person up on a pedestal, it leaves others below on the ground. And some of those left behind may feel resentful. Perhaps they contributed to the effort that's being recognized, or even came up with the original idea. Maybe they were part of a team that facilitated a key component to the successful outcome, but it happened behind the scenes where you couldn't see it. The point is, when you single someone out as the hero, it can make others who are just as worthy feel like goats.



Addressing 5 Objections to Big Data
Big data is all the rage these days. It has transitioned from just a hype word that people liked to throw around to sound smart to a technology that’s completely changing the world. Still, people try to minimize the importance of big data. Whenever something good comes around, there are people that will try and fight it. That can surely be said about big data. There are numerous objections to big data and what it can do, but most of these objections are unfounded and can easily be refuted by those who understand the big data industry. Let’s take a look at five common objections to big data and the responses for each one.


Back to the Future was right: a working hoverboard will be available in 2015
The big catch is that the Hendo can only hover over some types of metal. At the Arx Pax office, we hovered over a floor and half pipe covered in copper. That’s because the board generates a magnetic field. When there is a sheet of metal underneath, it is powerful enough to push the board upward (it’s the same technology as a Maglev train). The developer kit can support up to 40 pounds. The Hendo board can support up to 300 pounds, with support for 500 pounds planned for the future. It only dipped for a fraction of a second when I hopped on.


Keep calm and plug the holes
With network monitoring and analysis in place, you need to think about how best to make use of the data. Don’t be too quick to throw it out. Network analysis tools have gotten a lot better than what was out there in the ’90s and early 2000s. It’s easier now to sift through huge amounts of data in a relatively short amount of time. When a zero day is published, that data can be useful for taking a look back at what had been happening prior to the zero day being published. You also need to have workarounds in place so that you’re not entirely dependent on outright fixes when zero days pop up.


The Untapped Potential Inside Social Media, Analytics (Part 2 of 2)
Grady, the social media analytics and enterprise search sales manager at Information Builders, has worked on social media analytics, search-based business intelligence, mobile applications, predictive analytics, and dashboard design in his 15 years at the company. He blogs about social media, business intelligence and more. Grady recently spoke, along with Fern Halper, TDWI's research director of advanced analytics, at a TDWI Webinar on "Social Media Analytics – Getting Beyond Tracking the Buzz."


Will Your Next Best Friend Be A Robot?
The glum robot is named Takeo, and by the end of the play, it’s clear he is not the only one with problems. The man of the house is unemployed and pads around barefoot, a portrait of lethargy. At one point, his wife, Ikue, begins to weep. Takeo communicates this development to his fellow robot Momoko, and the two discuss what to do about it. “You should never tell a human to buck up when they are depressed,” says Takeo, who himself failed to buck up when the man attempted to cheer him with the RoboCop theme song earlier. Momoko agrees: “Humans are difficult.”


Java Sleight of Hand
Every now and then we all come across some code whose behaviour is unexpected. The Java language contains plenty of peculiarities, and even experienced developers can be caught by surprise. Let’s be honest, we’ve all had a junior colleague come to us and ask “what is the result of executing this code?”, catching us unprepared. Now, instead of using the usual “I could tell you but I think it will be far more educational if you find it by yourself”, we can distract his attention for a moment (hmmm.... I think I just saw Angelina Jolie hiding behind our build server. Can you quickly go and check?) while we rapidly browse through this article.


Quote for the day:

"In a number of ways Open Data improves society - for one it can grow GDP" Chris Harding, The Open Group

October 21, 2014

Good Strategy/ Bad Strategy (Richard Rumelt, 2011)
It is because crafting a good strategy takes a lot of discipline. Most managers mistakenly take strategy work as an exercise in goal setting rather than problem solving. A bad strategy is often characterized by being full of fluff, as it fails to face the challenge, mistakes goals for strategy, and comprises of bad strategic objectives (mostly misguided or impractical). Talking about the prevalence of bad strategies, the author quips that- "if you fail to identify and analyze the obstacles, you don't have a strategy. Instead, you have either a stretch goal, or budget, or a list of things you wish would happen"


Technology and Inequality
Brynjolfsson lists several ways that technological changes can contribute to inequality: robots and automation, for example, are eliminating some routine jobs while requiring new skills in others (see “How Technology is Destroying Jobs”). But the biggest factor, he says, is that the technology-driven economy greatly favors a small group of successful individuals by amplifying their talent and luck, and dramatically increasing their rewards. Brynjolfsson argues that these people are benefiting from a winner-take-all effect originally described by Sherwin Rosen in a 1981 paper called “The Economics of Superstars.”


Building Culture Is Always Better Than Trying to Transform It
A strengths-based approach to organizational culture is, in part, a matter of perspective. Instead of seeing the cultural glass as half empty, we see it as half full. Instead of carping on about everything that’s wrong with the organizational culture, we focus on everything that’s right. We should work with culture, instead of against it. ... But where traditional culture change often focuses on stopping old practices and starting new ones, a strengths-based approach to managing culture would instead concentrate its efforts on figuring out how to better use — amplify, optimize, intensify — the culture’s most helpful existing attributes


Doctor Who and the Dalek: 10-year-old tests BBC programming game
He’s a VB programmer (be gentle, he’s only 10), which is part of the problem schools face in teaching coding; they are supposed to teaching coding before the idea of a variable has appeared in maths. To get past this, the Doctor Who creative team have used a similar look and feel to Scratch, already in widespread use in schools to introduce coding. Although as an IT pro you take pride in mastering cryptic error messages, like “NULL pointer is not NULL at line -1” (yes, I’ve had that one), it can put off the average eight-year-old. The “Make it Digital” agenda is that every child should code, not just the smart ones, so as in Scratch, it is actually impossible to have a syntax error.


Devops has moved out of the cloud
Continuous everything is a part of the devops process, where devops is the fusing of software development (dev) with IT operations (ops). The core notion is to release high-quality code and binaries that perform well and are of good quality, and to do so much more rapidly than traditional approaches to development, testing, and deployment would allow. Many people attribute the rise of devops directly to the growth of cloud computing. The connection: It’s easy to continuously update cloud applications and infrastructure.


Health IT Interoperability Up To Market, Say Feds
One of their biggest recommendations is the immediate need within the health industry for standard, public application programming interfaces that allow disparate health systems to speak with one another. Such APIs are critical to enabling the interoperability required for electronic health information exchanges. "We believe that a standards-based API, combined with appropriate incentives to encourage vendors to implement the API and providers to enable access to their data via the API has potential to move interoperability forward dramatically," McCallie said in emailed comments.


The Benefits of an Application Policy Language in Cisco ACI: Part 4
Though the DevOps approach of today—with its notable improvements to culture, process, and tools—certainly delivers many efficiencies, automation and orchestration of hardware infrastructure has still been limited by traditional data center devices, such as servers, network switches and storage devices. Adding a virtualization layer to server, network, and storage, IT was able to divide some of these infrastructure devices, and enable a bit more fluidity in compute resourcing, but this still comes with manual steps or custom scripting to prepare the end-to-end application infrastructure and its networking needs used in a DevOps approach.


Why Apple Pay Is the Perfect Example of the Hummingbird Effect
Apple Pay will work at retail stores but it could also become the defacto standard for online purchases that add an extra security step--namely, proving your identity using the Touch ID fingerprint reader. I'm impressed with how fluid it works even at launch. There's a good lesson here for small businesses, beyond the fact that it's important to follow these tech trends and start preparing for the inevitable. In his book How We Got To Now, author Steven Johnson explains how breakthroughs in science and technology often lead to what he calls the "hummingbird effect"--essentially, a way to "piggyback" ideas on top of one another that helps catapult them into mainstream consciousness.


Best Practices for Moving Workloads to the Cloud
The adoption of cloud architecture is a process that requires strong effort for the entire enterprise. Every function, application and data have to be moved to the cloud; for this reason, it is necessary to have a strong commitment from the management. Top management is responsible for the harmonious growth of the company, and technology represents a key factor for business development today. Managers have to establish reasonable goals for adopting the cloud computing paradigm. A migration to the cloud requires a team effort to plan, design, and execute all the activities to move the workloads to the new IT infrastructure.


Crafting a secure data backup strategy on a private cloud
Backing up data is not something to be taken lightly, and a repercussion of data loss could be significant financial loss. Frequently, companies are unaware that they don't have a backup strategy in place, or that their backup product is not working properly. More often than not, this is because companies aren't devoting the necessary resources to create a proper backup strategy. Even if they do, they expect the backup product to work indefinitely. Unfortunately most things have an expiration date; the backup strategy is not any different.



Quote for the day:

"Leadership, on the other hand, is about creating change you believe in." -- Seth Godin