November 04, 2014

How Smart, Connected Products Are Transforming Competition
Some have suggested that the internet of things “changes everything,” but that is a dangerous oversimplification. The rules of competition and competitive advantage still apply. ... The increasing capabilities of smart, connected products not only reshape competition within industries but expand industry boundaries. This occurs as the basis of competition shifts from discrete products, to product systems consisting of closely related products, to systems of systems that link an array of product systems together. A tractor company, for example, may find itself competing in a broader farm automation industry.


Gartner Hype Cycle: Exploring the leading-edge technologies for a digital business
"Skinput provides a new input technique based on bioacoustic sensing technology that allows the skin to be used as a finger input surface." Tapping your skin in various places creates distinct acoustic signals, which sensing devices can pick up. The software can process differences based on bone density, size, and effects produced by soft tissues and joints. "Interactive capabilities can be linked to different locations on the body." Skinput is a 21st century approach to the classic computing notion of input.


An open source ERP system built to self-implement
Another key aspect of the industry is that users would need an IT consulting company to implement and customize an ERP. We want to change that. ERPs should be simple enough to be self-implemented. This is why users are selecting ERPNext over other alternatives, because we are completely focused on the do-it-yourself user. There are a couple of good open source ERPs out there, but they are still hard to configure and need a partner to help you get started.


Information Security - Cost Analysis
In the best interests of the investors, any spending or investment should be backed up with an appropriate cost-benefit analysis. Applying this cost-benefit-justifications to Information Security function is gaining focus but remains a challenge. Quantification forms the basis for being able to perform the cost-benefit analysis. The advantages of quanti fication are its accuracy, objectivity, and comparability. In addition, quanti cation is the basis for calculations and statistical analyses. While costing is a comparatively easier aspect, quantifying the benefits is still a challenge as it depends on the occurrence of uncertain events.


Collection Pipeline
Collection pipelines are a programming pattern where you organize some computation as a sequence of operations which compose by taking a collection as output of one operation and feeding it into the next. (Common operations are filter, map, and reduce.) This pattern is common in functional programming, and also in object-oriented languages which have lambdas. This article describes the pattern with several examples of how to form pipelines, both to introduce the pattern to those unfamiliar with it, and to help people understand the core concepts so they can more easily take ideas from one language to another.


A Brain-Inspired Chip Takes to the Sky
The first time the drone was flown into each room, the unique pattern of incoming sensor data from the walls, furniture, and other objects caused a pattern of electrical activity in the neurons that the chip had never experienced before. That triggered it to report that it was in a new space, and also caused the ways its neurons connected to one another to change, in a crude mimic of learning in a real brain. Those changes meant that next time the craft entered the same room, it recognized it and signaled as such.


The next wave of IT fadeouts
IT and its hosting enterprises have passed through monumental changes over the past decade. Through it all, CIOs have maintained a strategic eye on 'next thing' technologies. However, with relatively flat IT budgets, they have also looked for IT investments that are on the decline. Some of these technology 'fadeouts' are internal approaches to IT and general business operations and management that just don't seem to work well any more. Others involve a particular technology solution that has seen its day. ... What are the likely technology fadeouts?


Why LinkedIn’s data science reorg actually makes a lot of sense
And no, the shakeup hasn’t brought product innovation to a halt. Employees still get one “InDay” per month to do things they don’t ordinarily do. Look, for instance, at a project Lutz did a few months ago, right after the reorg happened. Finger, who generally does work for internal consumption, used LinkedIn’s vast supply of information on users to predict the career trajectory of a reporter at Mashable. “It was just an idea,” Finger said. His colleagues thought it was awesome, he said, and supported it.


Forecast 2015: IT spending on an upswing
When it comes to new technology, business leaders don’t know what they don’t know, he says. Therefore, it’s part of his innovation strategy to make all parts of the organization aware of new technologies that can improve business processes and bring in new customers. And why not? With the economy slowly improving, IT leaders are more optimistic that corporate purse strings will loosen up in 2015, and they’re eager to bring new technologies into the fold in addition to just keeping the lights on.


Updated Principles of Service Orientation
A SO ecosystem is “a space in which people, processes and machines act together to deliver those capabilities as services”. In a SO ecosystem, “there may not be any single person or organization that is really ‘in control’ or ‘in charge’ of the whole”  ecosystem. Services in the SO ecosystem are the means by which “the needs of a consumer are brought together with the capabilities of a provider”. Services are the realization of business functionality accessible through defined service interfaces.



Quote for the day:

"Our expectation in ourselves must be higher than our expectation in others." -- Victor Manuel Rivera

November 03, 2014

Look at what Google and Amazon are doing with databases: That's your future
"The era of the one-size-fits-all database is over. It used to be when I grew up as a developer that for the architect in the project, when it came to choosing the bottom layer of the stack — the persistence layer — the choice was Microsoft, or IBM, or Oracle, or Sybase. It was a vendor choice," he said. "They were all the same type of database. But that era has gone forever and it will never come back because data is just so big and so irregularly shaped now that you're always going to be able to get a hundred times improvement, a thousand times improvement, a million times improvement if you get a data technology that is shaped like the shape of your data.


It’s Not HR’s Job to Be Strategic
Companies will really start feeling the consequences over the next decade. Millennial Branding and Monster.com found that one-third of Millennials rank training and development opportunities as a prospective employer’s top benefit. Cutting corners in this area may jeopardize employee engagement and retention in a demographic that will represent 75% of the U.S. labor force by 2025. A centralized HR department is ill equipped to address this. But embedding learning and development — along with talent acquisition — within each business function can solve the problem because it will shift the focus from cost reduction to value creation.


When It’s Sink or Swim
Walking away from a two-year project that’s at 200% of budget, yet seems 2% away from the finish line, is a tough call to make and is no small admission of misspent resources. But, even worse, what if the new approach were to fail at its own 95% point? What then? The company weighed the risk factors of each choice, gave us leash to further prove our new technology stack, and made the decision to switch platforms. Ultimately, time was the enemy posing the greatest threat, and they had to stand up a robust product soon. Fast-forward eight weeks and finally they had their “Netflix” platform, a stable, fully functioning health information exchange.


Where the data science jobs are, by sector and by state
The data science meme has been trending for several years now. Nearly everyone wants to be a data scientist, talk to a data scientist, hire a data scientist or invest in a data science startup. But where are all those data scientists working? And what are they working on? A good place to get a handle on the data science sector is Data Science Central, one of the industry’s leading data science community sites and blogs. It’s the online watering hole for data scientists and its edited and run by Vincent Granville.


8 Strategies to Fund Your New Business
As many first-time entrepreneurs know, or have found out, getting a traditional bank or even an SBA loan to start a new business isn't easy. So where else can you go to fund your dream? Fortunately, today entrepreneurs have many options than ever when it comes to funding their new business or business idea, many of which are less difficult to obtain and less expensive than a bank loan. Here are eight strategies for financing a new business, product or service.


Your 2015 IT Security Plan: What You Need to Know
Over 80 percent answered that IT departments actually felt secure with the technology that they had in place, but they feared what end users might do, either intentionally (example: Edward Snowden) or unintentionally (example: CryptoLocker). The response was that, although IT departments are the focus of where to combat the new threats, it’s the actions of end users that are often the root cause of the problem. Despite the great innovation in newer security products, the industry itself is still in a reactionary mode, responding to modern threats rather than being a step ahead. Therefore, while the technology is important, other areas of the business need to be addressed in order to make a company more secure.


Does the internet need rebooting?
Perrig has now developed a net­work architecture with his team that may enable all these drawbacks to be remedied. This concept, called Scion, is not only supposed to make the in­ternet safer, but also more straightfor­ward and efficient. The central idea is to divide the internet into several in­dependent units, so-called “isolation domains”. In every domain, the au­tonomous systems themselves control the paths along which they exchange data. Therefore, autonomous systems in Domain 1 no longer have an influ­ence on the data traffic in Domain 2 and vice versa. Of course, a global data exchange is also possible with this new structure – via so-called edge routers at the boundaries of the individual domains.


Data retention won't catch terrorists without big data strategy
The real crux of big data analysis is to look for patterns and for testing hypotheses. We should also remember that predictive analytics techniques are not perfect by definition, i.e. they have to be coupled with other intelligence and research.  Finally, it's a hard sell to believe a tech-savvy terrorist would use the same IP address or the same mobile phone that they used a year ago. Once people learn about the legislation, it won't be difficult for them to bypass the system. A better solution would be for the federal government to work with telcos and ISPs on real-time anomaly data detection techniques by enabling/funding them to deploy big data techniques within their firms.


The Ethics of Data, Visualized [INFOGRAPHIC]
In all, the biggest problem with data collection for most people is this: they didn't know it was happening. For better or worse, understanding around what type of data is being collected and how it is being used is relatively low. And, because of this, many companies easily sneak data collection methods into Terms of Service agreements most users never read, or wouldn't fully understand if they did. What we are lacking here in transparency and accountability in data collection and use. And this is a big deal, because much of this data is personal, non-anonymous and can be hacked, stolen or used to discriminate against particular groups or segments.


What's new with Java
Unsigned applets run in a Java sandbox, walled off from the host system. Although the sandbox is far from perfect, reasonable people might consider applets confined to a sandbox safer. Oracle considers them more dangerous. In my opinion, they are placing way too much faith in the Certificate Authority system. Nonetheless, because Oracle thinks they are a greater security risk, they make it harder to run an unsigned applet than a signed one. The other big factor in running applets is the Java security level. Java 7 has three security levels, Java 8 (as of Update 20) has only the two highest levels from Java 7. Both versions of Java default to the second highest level, which Oracle calls "high".



Quote for the day:

"Nothing is easier than saying words. Nothing is harder than living them day after day." -- Arthur Gordon

November 02, 2014

The Minimum Viable Product and Incremental Software Development
The MVP is used in the context of the “build-measure-learn” feedback loop. From the Lean Startup site: “The first step is figuring out the problem that needs to be solved and then developing a minimum viable product (MVP) to begin the process of learning as quickly as possible. Once the MVP is established, a startup can work on tuning the engine. This will involve measurement and learning and must include actionable metrics that can demonstrate cause and effect question.” Now the question is: What is the right way to build the MVP? Of course we should adopt some form of incremental development, in which the MVP should be concluded after a few initial iterations.


Introducing Pair Programming
In an environment where every line of code is reviewed as it is written, code quality goes up dramatically. The quality of the code review gets increased because the reviewer is fully in the context of the code and actively participating in its formation. Several studies such as this one by Alistair Cockburn and Laurie Williams have compared side by side code written in pairs vs code written solo, and concluded that the paired code had fewer defects, and better design than the soloed code. In the Cockburn and Williams study, the paired programs were "consistently 20 percent shorter than their individual counterparts, indicating a more elegant and maintainable solution."


Random Image Experiment Reveals The Building Blocks of Human Imagination
Here’s a curious experiment. Take some white noise and use it to produce a set of images that are essentially random arrangements of different coloured blocks. Show these images to a number of people and ask whether any of the images remind them of, say, a car. Most of the time, these random images will appear to people as, well, random. But every now and again somebody will say that an image does remind them of a car. Set this image aside. And repeat. After assessing, say, 100,000 images in this way, you’ll end up with a set of essentially random pictures that remind people of cars.


You’ve Got To Admit It’s Getting Better
Even test-driven development — the notion that a development team’s automated tests are even more important than the actual software they write, and should be written first — is being criticized. Once this belief seemed almost sacrosanct (although in my experience most of the industry paid it only lip service.) Now, though, Pieter Hintjens argues, “The more you test software, the worse it will be.” Peter Sargeant agrees: “The whole concept of Test-Driven Development is hocus, and embracing it as your philosophy, criminal.”


The 5 Most Common Data Relationships Shown Through Visualization
As the amount of data available to organizations and marketing departments grows, visualizations of that data are growing more complex. That’s not to say that data visualizations are becoming unwieldy – quite the opposite. The increasing amount of information being displayed in visual form helps viewers understand the often convoluted relationships between ranges of data. However, when presented with the choice to visually represent data relationships, it can be difficult to choose which model to apply. Different types of data work better with specific visualization models.


Eight Docker Development Patterns
A foundation for all of my Docker experiments, is keeping state that should persist in volumes, so that the Docker containers themselves can be re-created at will without data loss (unless I've been naughty and modified container state without updating the Dockerfile's - and regularly rebuilding the containers helps stop that bad habit). The examples Dockerfiles below are all focused on that: Creating containers where the containers themselves can be replaced at any time without having to think about it. The more regularly the containers are recreated; the more habitual this becomes, the more it reinforces a habit of avoiding state outside of clearly defined locations that are explicitly persisted.


Foundations of Data Science
The field of algorithms has traditionally assumed that the input data to a problem is presented in random access memory, which the algorithm can repeatedly access. This is not feasible for modern problems. The streaming model and other models have been formulated to better reflect this. In this setting, sampling plays a crucial role and, indeed, we have to sample on the fly. in Chapter we study how to draw good samples efficiently and how to estimate statistical, as well as linear algebra quantities, with such samples.


The Potential Of Beacon Technology
Beacons are a unique and sophisticated tool in the world of merchandising and advertising. However, if we take a step back and think about exactly how beacons are reaching retail locations, there is reason for concern rather than excitement. Currently, beacon networks are fragmented and closed. At quick glance, this may not be a concern, but thinking ahead, this fragmentation will likely result in long-term negative implications for consumers, retailers and developers alike. An analogy for beacon technology is GPS. Since its inception, GPS technology has always been an “open system” onto which developers could innovate and extend new product applications.


Exploring the Hexagonal Architecture
A hexagonal architecture has three layers with the key part being the Domain model containing all the logic and rules of the application. No technology concerns, e.g. HTTP contexts or database calls, are referenced in the domain, allowing changes in technology to be made without affecting the domain. Around the domain model is the Ports layer receiving all requests that corresponds to a use case that orchestrates the work in the domain model. The ports layer is a boundary with the domain on the inside and external entities on the outside.


Oxford Economics Study Reveals EMEA Companies Unprepared for Workforce 2020
All of this isn’t to say that EMEA-based companies aren’t taking steps to address the top issues of the future workforce. “Workforce development is seen by the board as a strategic priority as it’s critical to meeting corporate objectives and growing the business,” said Kevina Wepukhulu, Chief Manager, Human Resource and Administration, Kenya Power and Lighting Co. “The effort is arrayed around key areas, including strategies for systems, for the organization, and for teams and individuals. The approach is based on learning and development, which enables us to retain the workers we hire and train.”



Quote for the day:

"Great leaders use delegation as a time management tool for themselves and as a development tool for their team." -- @ManagersDiary

November 01, 2014

How Streaming Analytics Detects Fraud and Keeps Customers Happy
The most challenging aspect of fraud prevention is detecting it as it occurs across the entire account base. Because hackers can fleece individual accounts within seconds of infiltration on a large scale, if your security systems can’t detect fraudulent behavior within individual accounts in real-time, you are essentially compounding your losses with each passing second.  With streaming analytics, banks can continuously ingest, correlate, enrich, and analyze streams of data across diverse sources – including third parties – to immediately spot anomalies indicating fraud down to the second of occurrence and implement immediate automated remediation measures.


The Periodic Table of IoT
The promise of connecting devices across homes, retail stores, automobiles, and physical machinery, otherwise referred to as the Internet of Things, has emerged into what is now a substantial ecosystem of private companies, corporations, venture investors and acquirers. ... we’re excited to introduce the Periodic Table of IoT (Internet of Things) – a guide to help make sense of the key players in the growing Internet of Things universe. The 141 companies, investors and acquirers on the list were drawn from analysis using CB Insights data around financial health, company momentum, investor quality and M&A activity.


The 1s and 0s behind cyber warfare
Chris Domas is a cybersecurity researcher, operating on what's become a new front of war, "cyber." In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.


Why Microsoft loves Linux
Nadella admitted that 20 percent of the operating systems on Azure are Linux. The open-source operating system is already contributing a lot to Microsoft's bottom line. Today, Azure — while it doesn't support the top business Linux, Red Hat Enterprise Linux (RHEL) — already supports CoreOS Linux, CentOS, Oracle Linux, SUSE, and Ubuntu on Azure. ... It's not just Linux that Microsoft loves. After decades of resistance, Microsoft supports a variety of open-source programs such as the big data Hadoop; Docker containers; and Facebook's Open Compute datacenter project. Indeed, Microsoft is even open-sourcing more of its own technologies such as parts of .Net.


Security vendor coalition cleans 43,000 malware infections used for cyberespionage
So far the vendors’ disruptive action called Operation SMN resulted in the removal of 43,000 instances of malicious tools installed by the Axiom attackers on compromised computers, according to a full report published Monday by Novetta, the data analytics firm that led the coalition. The clean-up effort was done through Microsoft’s Malicious Software Removal Tool (MSRT), which is updated and distributed through Windows Update monthly, and through the security products of other vendors involved in the operation. One hundred eighty infections were instances of Hikit, a malware program used by Axiom for data exfiltration and persistence during the last stages of its attacks, Novetta said.


Data Science 101: Scalable Machine Learning with Apache Spark
In the presentation below, courtesy of the SF Machine Learning Meetup group in San Francisco, Xiangrui Meng introduces Spark and show how to use it to build fast, end-to-end machine learning workflows. Using Spark’s high-level API, you can process raw data with familiar libraries in Java, Scala or Python (e.g. NumPy) to extract the features for machine learning. Then, using MLlib, its built-in machine learning library, you can run scalable versions of popular algorithms. The talk also covers upcoming development work including new built-in algorithms and R bindings.


Learn to Boost Data Center Capacity With Public Cloud
Without a doubt, one of the most powerful benefits of cloud computing is the ability to extend the existing environment beyond the current datacenter walls. Administrators are able to do more with less as cloud computing components have become much more affordable. Now that both unified computing and WAN-based solutions have come down in price, IT environments are quickly seeing the direct benefits that cloud computing can bring to an organization.


Backup and restore of MySQL to OpenStack Swift
xbcloud uploads and downloads full or part of xbstream archive to/from OpenStack Swift. So what is xbstream? xbstream is a streaming format available in Percona XtraBackup that overcomes some limitations of traditional archive formats such as tar, cpio and others which did not allow streaming dynamically generated files, for example dynamically compressed files. Archive uploading will employ multipart upload for Large Objects on Swift. Along with this, the xbstream archive index file will be uploaded which contains list of files and their parts and offsets of those parts in xbstream archive. This index is needed for downloading only part of archive  on demand.


Major banks ready their own mobile payment apps
The most likely way will be through a technology called host card emulation, that was introduced in Android 4.4 “KitKat” and allows software apps to emulate the secure element chip found on some bank cards and the iPhone 6. Using software means wider compatibility with phones than if a dedicated chip was required. The mobile payments market had been relatively quiet until recently. Google Wallet and Softcard, a competitor backed by cellular carriers, were in the market but consumer awareness and interest appeared to be low.


Drupal warns unpatched users: Assume your site was hacked
"Attackers may have copied all data out of your site and could use it maliciously," the Drupal security team said. "There may be no trace of the attack." The vulnerability also allows the installation of multiple backdoors in the site's database, code, file directories and other locations and it's impossible for an administrator to say with complete confidence that all of them were found. Attackers may use such backdoors to attack and compromise other services on the underlying Web server, allowing them to expand their access beyond the website itself, the Drupal security team said.



Quote for the day:

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.” -- Abraham Maslow

October 31, 2014

In contrast with the China-based threat actors that FireEye tracks, APT28 does not appear to conduct widespread intellectual property theft for economic gain. Instead, APT28 focuses on collecting intelligence that would be most useful to a government. Specifically, FireEye found that since at least 2007, APT28 has been targeting privileged information related to governments, militaries and security organizations that would likely benefit the Russian government.


Experts: Major cyberattack will hit in next 11 years
Almost two-third of technology experts expect a "major" cyber attack somewhere in the world that will cause significant loss of life or property losses in the tens of billions of dollars by 2025. A survey released Wednesday by the Pew Research Center found that many of analysts expect disruption of online systems like banking, energy and health care to become a pillar of warfare and terrorism. The survey asked over 1,600 technology experts whether a major attack that would cause "widespread harm to a nation's security and capacity to defend itself" would be launched within the next 11 years.


Top CIOs Start the Journey to the 'Digital Enterprise'
The digital enterprise is more than just a CIO catchphrase. In a recent Altimeter Group survey, 88 percent of 59 digital strategy executives interviewed said their organizations are undergoing formal digital transformation efforts this year. Even CIOs who think the phrase "digital enterprise" is mushy, like Mojgan Lefebvre, CIO of Liberty Mutual Global Specialty, say that consumers wielding smartphones have shifted the balance of power. "The one thing that comes in and absolutely disrupts industries is giving the end-user customer, consumers, the ability to do anything and everything they want on their mobile device," Lefebvre says.


Enterprise Cloud Service Broker—A New Identity for IT, CIOs
A cloud service brokerage, as defined by Gartner Group, is “an IT role and business model in which a company or other entity adds value to one or more (public or private) cloud services on behalf of one or more consumers of that service.” Gartner recently challenged CIOs to explore how they should position themselves as CSBs within the enterprise by “establishing a purchasing process that accommodates cloud adoption, and encourages business units to come to the IT organization for advice and support.” Why not just bring in an outside organization to manage cloud vendors? Indeed, many new companies have sprung up recently to help IT departments procure their cloud services.


The science behind the ebb and flow of Ubuntu Unity's popularity
This has surprised a lot of people, but I would argue that it shouldn't. Why? Unity has been around for a while now, and it's had plenty of time to evolve and get things right. The initial release was 2010, and the Unity we have now is not the Unity we had then. Users have had plenty of time to acclimate. The HUD, the Dash, Scopes -- they all work in a harmony that most desktops can't replicate. Even with the current state of popular that Unity is enjoying, I remember the reaction of the Linux community when the desktop first arrived -- it seemed as if Ubuntu was on a collision course with disaster.


Healthcare IT: User Empathy Comes First
Too often we see information systems organizations driving and delivering products and services without first understanding what to deliver. One great companion tool for enabling the customer empathy mindset is an empathy map. ... Underlying an empathetic mindset is a deep curiosity to find out the answers to these and many more questions. It is also supported by a desire to delight users with your product or service. As mentioned in my previous blog, defining a product's or service's success in terms of a "Love Metric" is key to moving an organization toward becoming one that is known for its customer empathy mindset.


Setting Traps, and Other Internet Security Tips
The cold truth is that the JPMorgan breach and the rest are not symptomatic of anything new—online businesses have been under constant cyberattack for well over a decade. What’s different today is that there is a lot more at stake because so much of what we do every day is online. Here is what I recommend: use two-factor authentication—essentially verifying via SMS on your mobile phone that you are the owner of a particular account online, every time you sign on. Google, Facebook, Twitter, and just about every major bank provides this option. Also, since everyone gets hacked online eventually, make sure the damage is limited.


Small Businesses Investing in Mobile Technology
"Small business should pay attention to some of the same places they have been getting their cloud and mobility information," Seth Robinson, senior director for technology analysis at CompTIA, told eWEEK. "These two areas provide the foundation for IoT and will help give some insight as to how SMBs will begin using the technology." obinson said just as small businesses have learned about the benefits of cloud and mobility in their space--which are often different than enterprise benefits--they will learn about the benefits of IoT as the trend takes shape.


Following the launch of Apple Pay, Juniper Research thinks NFC will finally be a success
Juniper had been pessimistic about the market after the dismal showing of the NFC-based Google Wallet, launched in 2011, and Apple's failure to include NFC in the iPhone 5. Apple had also said that BLE (Bluetooth Low Energy) and Wi-Fi had "more desirable characteristics for maintaining the link over time than NFC", and it could have adopted BLE instead. With the arrival of Apple Pay, based on industry-standard EMV contactless protocols running over NFC, Juniper has changed its view. In the context of the US market's development, Apple Pay has arrived at a better time than Google Wallet.


Microsoft Adds IoT, Big Data Orchestration Services to Azure
"Every day, IoT is fueling vast amounts of data from millions of endpoints streaming at high velocity in the cloud," says Joseph Sirosh, corporate vice president of Machine Learning at Microsoft. "Examples of streaming analytics can be found across many businesses, such as stock trading, fraud detection, identity protection services, sensors, web clickstream analytics and alerts from CRM applications. In this new and fast-moving world of cloud and devices, businesses can no longer wait months or weeks for insights generated from data."



Quote for the day:

“You can't connect with something you're not passionate about.” -- Gemma Arterton