November 09, 2014

How Your Clients Can Use COBIT and BiSL to Manage Their Information
Most of BiSL’s guidance addresses the first point, whereas COBIT is stronger in the second area. Many COBIT practices apply to business information management and contribute to providing assurance that business information management processes are executed effectively. Business information managers who want to use COBIT key practices, to assure themselves and stakeholders that the information systems (in the broadest sense of the word) are under control, can use BiSL to help them decide how to implement the key practices. BiSL does not provide specific guidance as to how to comply with the key practices, but gives an extensive description of the content of the processes.


Agile and SaaS – Lessons for Value Realization
SaaS and Agile combine to enable more nimble project governance. Business leaders are able to steer the project in two-week increments to gain maximum benefit by focusing resources on features that yield immediate value, while deferring “nice-to-have” features for future deployments. As well, business leaders gain the confidence to manage the project in this way, knowing that the Agile approach means that Release 1 will indeed be the first of many value-adding deployments in a multi-release program.


TGF: Impact of the Internet of Things Version 1.0
The latest wave of developments takes interworking still further by incorporating objects of all sorts into the network of IT services, information, organizations and people. This is the Internet of Things (IoT) that provides the potential for e-devices to be commonly built into infrastructure such as roads, vehicles, localities (e.g. smart cities), homes, livestock and even people (e.g. for measuring bodily functions). Many organizations, including governments, are realizing that there are financial, social and other benefits that are emerging though the use of networks of e-devices for the collection of data (e.g. the monitoring of people and their environment for health purposes) or raising alerts (e.g. when river levels rise).


5 Steps to Actionable Key Performance Indicators
A KPI (Key Performance Indicator) should immediately inform the reader how the business is performing which in turn should suggest what actions need to be taken. And if we are measuring the effectiveness of a website, the KPIs need to inform us how the site is doing in driving our business objectives. But most don’t. Too many organizations create Top-10 lists: Top-10 pages, downloads, videos, keywords, referrers, etc. Is it important to know which documents were downloaded the most, or what keywords drove the most traffic to your site?


List of sample KPIs in 5 perspectives of BSC
Here is a general list of key performance indicators which are divided into categories. This list should not be viewed as a must have set of indicators, but it is based on the experiences of many companies and researches related to scorecards. ... t is often reasonable to evaluate not only the efficiency of some production processes and operations at a given moment, but also assess the potential of these indicators, and the opportunities to improve them in order to increase production output and broaden production line.


Agile Enterprise Architecture Increases IT Relevance
Five years ago, Cisco started on an enterprise architecture journey to unify business strategy with IT investments. Today, all of our planning and decision-making is based on an agile, well-defined architecture-based framework.We make it real by ensuring that everything we do in IT is based on business architecture. We understand what our clients are doing and what they need, and then translate that into technology architecture and roadmaps that deliver capabilities to meet their needs. ... Enterprise architecture is a springboard for cultivating consistent communication and transparency between IT and the business. It’s a mechanism for helping our users across Cisco derive strong business value from IT.



Architecturally Significant Requirements
As you progress in your career you will learn that architectural requirements are hard to determine, primarily because they need to be gathered so early in the lifecycle before anything is really known. We know that architects should start early in project lifecycles based on when an architect engages in a project, with the end goal being integration into the innovation and project funding lifecycle itself. Hopefully, your organization has learned that getting an architect engaged before the project kickoff will not only save you money but is at the root of incremental innovation. Either way at some point the solution architect will be faced with a business case and business architecture


KeyStone Security and Architecture Review
This presentation will cover architectural and procedural security concepts within KeyStone, specifically Trusts or Delgations, AMQP Security with KeyStone and integration with a Corporate LDAP for single source of truth. Given the distributed nature of OpenStack KeyStone plays a major role in binding all of the Projects together but not much is mentioned about how to do this with KeyStone or what the pitfalls and dangers of hooking up a centralized Security System to the rest of the cloud will be. Not only do you have to be wary of the services that connect to KeyStone but you also have to be cautious of the kinds of input and data you give to KeyStone from external sources.


Testing the Internet of Things: The Human Experience
“Human Experience” testing has the following components of human interaction with the device. We should test all things physical, including sizes, shapes and genders of the users. We should also include sensory reactions including sight, sound, and touch. Orientation or the interaction with human movement is an incredible crucial part of the test. We must plan for testing in various geographical locations, different weather conditions and contexts. Finally we must consider value and most thoroughly test in terms of the users’ perceptions, mindsets, biases and emotions when interacting with the device.


Agency TheoryAgency theory assumes that the interests of owners and managers are inherently in conflict and that defensive activities are necessary by owners to protect these interests. Stewardship theory points out that these assumptions aren't always true. A series of theoretical propositions concerning the stewardship model were made by Davis, Schoorman and Donaldson. Their ideas, in conjunction with ideas on best practices in IT governance from Weill and Ross  provide an explanation for variance in the effectiveness of a varietv of governance models. Application of the stewardship model results in several novel approaches to IT governance and technology management, especially with regard to post implementation value delivery



Quote for the day:

"If the rate of change on the outside exceeds the rate of change on the inside, the end is near." -- Jack Welch

November 08, 2014

Does Watson Know the Answer to IBM’s Woes?
The hope is that the technology will be able to answer more complicated questions in all sorts of industries, including health care, financial investment, and oil discovery; and that it will help IBM build a lucrative new computer-driven consulting business. At the M.D. Anderson Cancer Center in Houston, a version of Watson is helping doctors develop treatment regimens from a patient’s symptoms based on an analysis of thousands of pages of medical papers and doctors’ notes. There is good reason for IBM’s management to hope that the technology might provide the spark for its reinvention.


Why Amazon Echo is the future of every home
As artificial intelligence, voice recognition, speech recognition and other technologies related to virtual assistants improve, these interfaces will do amazing things for us. They'll understand, interpret and make decisions based on past behavior. We'll blurt out "Alexa" or "Hey Siri" or "OK, Google Now" or "Yo, Cortana" followed by something cryptic and colloquial: "We need paper towels!" The assistant will know your preferences and will have access to your credit card, so it will go ahead and order the paper towels and have them shipped. It's not hard to see why this is important to Amazon.


Windows 10 Enterprise Features Revealed
Microsoft also announced Friday that Windows 10's device management options will be more expansive than Windows 8.1's. In the latter OS, Microsoft introduced mobile device management (MDM) capabilities that allowed enterprises to manage PCs, tablets, and smartphones with one technique. This addition was designed primarily for BYOD scenarios, but in Windows 10, Microsoft will add MDM options for corporate-owned devices. The additions will include support for managing multiple users who share a single device, full control over the Windows Store, VPN and device-wipe capabilities, and the configuration of Enterprise Data Protection policies.


How to Master Google Analytics
Google analytics is a free platform which integrates seamlessly with any website and has a tremendous amount of data that can easily be extracted once users are familiar with the interface. In addition, Google analytics is a platform that will grow with the company without any additional investment. There are other analytic platforms out there such as Clicky, which are low-cost and have a few different bells and whistles than Google analytics does, but in my opinion this analytics platform has all the things you’ll need to get started and grow your online business.


Mark Zuckerberg's Great Vision for the Next 10 Years of Facebook
Facebook will be investing in ways to better target and measure campaigns through data. It wants to help brands measure online to offline sales conversions. Currently advertisers only spend about 11 percent of their budgets on mobile, according to Facebook COO Sheryl Sandberg, because the right tools aren't yet in place. Finally, Facebook wants to build the next major computing platform, which Zuckerberg believes could be augmented reality and Oculus. He also wants to bring the internet to more people through Internet.org. "We're going to prepare for the future by investing aggressively," Zuckerberg said.


Using Open Source Solutions for Cloud-Ready Big Data Management
This growth and reliance around data will be offloaded to the only platform that can handle these types of demands: the data center. Any growing organization must look at data center hosting options as a viable solution to an ever-evolving business and IT environment. Whether this is a cloud solution or a manage services option, the modern data center is the spot that can support changed business needs and evolving IT solutions. Database administrators have been forced to find new and creative ways to manage and control this vast amount of information.


“Dark Web” Version of Facebook Shows a New Way to Secure the Web
The Tor software works by connecting to a network of computers around the world known as “nodes.” When you access a website via Tor, your data hops between three of those nodes in encrypted form before traveling to the operator’s server. Data sent back to you by that server gets the same treatment. Tor software for website operators allows them to create a .onion address – known as a “hidden service” – and obscure the true identity and location of their servers. By using that, Facebook is the only major Web company to join what is dubbed the “dark Web.”


Monetizing Big Data: A Q&A with Wells Fargo's Data Chief
The incentive piece is tough. It's my job to show how there's a mutual benefit. Take online bill pay: it tells you a lot about customer relationships. Customers use online bill pay to pay other banks for products they don't have with us. If a customer has a deposit account in online bill pay with us but not a mortgage, and they own a home, they're paying a mortgage with a different bank, so that's why you should care about online bill pay if you have the deposit account. If someone's paying a different credit card with their online bill pay, that's why you should care about their data.


Data-Driven Intuition
The definition of intuition is “a direct perception of truth or fact independent of any reasoning process,” i.e., what is often referred to as “going with your gut.” In his quest to find a successful individual who truly used their gut and nothing else to make decisions, Ma discovered he needed to redefine intuition as “a direct perception of truth or fact independent of any documentedreasoning process” because “no one successful truly makes decisions without some reasoning process. ...  or they may not have the sufficient information to document that reasoning process, but it’s clear in all cases I explored that there was a method behind the madness.”


Getting the most out of impact mapping
Impact mapping is a strategic planning and visualisation technique with roots in user experience strategy and design. An impact map visually connects solution ideas (deliverables, such as user stories) to business goals through impacts on stakeholders and customer segments. By putting deliverables into perspective of user needs and behaviour changes, and putting user needs into the perspective of overall organisational objectives, an impact map visualises assumptions. This helps to create a big picture for software delivery and facilitates many good product management techniques, such as customer research and iterative planning, as well as helping stakeholders align and prioritise iterative delivery.



Quote for the day:

"Keep true, never be ashamed of doing right, decide on what you think is right and stick to it." -- George Eliot

November 07, 2014

IT Talent Shortage: Ugly Truths
"As one of the 'unemployable' IT workers with 3 decades of experience, I think you are missing something," one reader emailed me. "The one thing that was not discussed is how we are treating the people as disposable commodities in an industry where it can take decades to develop the knowledge, wisdom, and experience that is required." Disposable commodities. Take that in for a minute. For many people, I bet it hit home instantly. He's not the only person to voice that sentiment to me in the past few weeks as I researched this article, but he crystallized it.


Software Designs Products by Simulating Evolution
Dreamcatcher shows how even creative industries could be changed by automation. “Designers worry it will take their job away, and [they] doubt that it can create beauty,” acknowledges Autodesk’s senior director of design research, Mark Davis. Dreamcatcher’s simulated evolution process begins with the software offering a set of potential solutions to a problem posed by the user. The software then “breeds” a new generation of solutions by recombining the best of those designs, as chosen by the user, and adding some random variation. The software can repeat this process to produce thousands of designs


Five things we learned from robotics expert Mark Setrakian
While Setrakian may have started off with low, slightly lumpy robots on wheels, hacking and pummeling each other, Robot Combat League took the fight to humanoid form, scaling the difficulty of pretty much everything. Compared to the two or three motors found in the wheeled variety of drones, humanoid bots would take around 28 motors, with multiple degrees of freedom for movement -- he adds there was now a nuance of puppetry to how the humanoid bots moved and were controlled. These robots also had engineering ties to a project that followed after: the Female Figure.


The problem of managing schemas
But the worst problem by far is the fact that with CSV and JSON data, the data has a schema, but the schema isn’t stored with the data. For example, CSV files have columns, and those columns have meaning. They represent IDs, names, phone numbers, etc. Each of these columns also has a data type: they can represent integers, strings, or dates. There are also some constraints involved — you can dictate that some of those columns contain unique values or that others will never contain nulls. All this information exists in the head of the people managing the data, but it doesn’t exist in the data itself.


The Future of Enterprise IT: An interview with Geoffrey Moore
Systems of record are a must-have. They’re foundational, they’re critical, and they have to be protected. Systems of engagement are a nice-to-have in many industries, moving to must-have, where there’s opportunity to create a competitive advantage. You want to have an agile system of engagement that can interface to a stable system of record. The IT function has to bifurcate itself into two camps: A conservative camp that maintains and protects the systems of record; and A progressive camp that takes risks with systems of engagement. There will have to be some interface between the two, which is a new architectural interface that we haven't had to build in the past.


Home Depot attackers broke in using a vendor's stolen credentials
The stolen login credentials didn't provide direct access to its point-of-sale terminals, Home Depot said. But once inside, the hackers gained "elevated rights" that allowed them to navigate to other parts of its network and install their malware on self-checkout systems in the U.S. and Canada. The retailer didn't identify the third-party vendor that was compromised. A Home Depot spokesman said the attack is still under investigation and the company could not comment further.


InfoShot: EU Tech Lobbying Spend
According to the data, Microsoft is the biggest tech lobbying spender in Europe, splashing out €4.75million trying to influence lawmakers. That’s half the company’s US figure for roughly the same time period. China’s Huawei is also one of the biggest spenders in the tech industry, coughing up €3million, but its US spend last year barely scraped €500,000. Google, the biggest spender on US tech lobbying, only spent €1.25-1.5million in Europe, well short of the €11million the search giant spent in the US last year. This trend of spending less in Europe wasn’t just limited to Google and Microsoft.


The complexity of the IoT requires experience design solutions
What we’ll accept in the digital world isn’t the same as what we’ll accept in the physical world. “We have these expectations about things — like Skype calls can fail and web pages can be slow to load and sometimes emails go on a long route round to get to you and take a while,” Rowland says. “It is not great, but we’re used to that. However, we are used to physical things in the world around us responding immediately and reliably. That might not happen [with the IoT]. It is obviously not acceptable if you’re to turn a light on from your smartphone and have that take 30 seconds to respond. You are just going to think it’s not working. ”


Dogs In The Data Center: Flexibility Gone Wild
Reader "Technorati" wrote in to ask what I think about dogs coming to work at the IT department. I like dogs. Dogs are great. But this trend where your fellow IT workers feel like it's OK to bring them into work? Suuuuuure... Bring your dog to work. Outfit him with matching Birkenstocks and a hoodie. As long as he has expertise with Javascript, Python, help desk, or general sys admin. Or maybe some other things. I understand that your dog cannot write code, but maybe your dog can inspire you to write more or better code. But when is enough enough?


Collaboration: It’s not what you think it is
A continuum of interaction that I learned many years ago helped me to understand what collaboration is. It can help you to understand what you really want to do in the situations you deal with and therefore direct your attention, intention and behavior when you choose to collaborate. Three words that begin with “C” broadly describe the types of interactions and relationships you may have with others. On a continuum, they look like this:



Quote for the day:

"Playing it safe is the most popular way to fail" -- Elliott Smith

November 06, 2014

Nationwide launches smartwatch banking capabilities
Nationwide customers are now able to check their bank balance on smartwatches if they have already downloaded the building society’s mobile banking app. The firm partnered with IBM to develop a system to allow Android Wear users to perform banking tasks on their wearables. The smartwatch will connect to the mobile banking app to provide users with real-time updates of their balance. The new features were developed in the Front Office Innovation Centre, which was set up by IBM and Nationwide to find new ways to provide customers with the building society's services.


Apple unveils new enterprise support plan
As outlined on the site, AppleCare for Enterprise generally fits what industry analysts were told during summer briefings. Apple and IBM unveiled their alliance on July 15. Apple will assign a liaison -- an AppleCare account manager -- to companies that purchase support, and replace damaged or lost iPhones and iPads. Apple said it would exchange devices within one business day in most cases, and capped that part of AppleCare at 10% of a company's devices registered under the plan. IBM Global Technology Services, an arm of the Armonk, N.Y. company, will provide next-day onsite service, which is available for either two-year or three-year stretches.


Business transformation considered essential, but the enterprise struggles
Business transformation is about more than efficiency -- innovation is also a key theme. In order to stay ahead, executives said changes in client expectations, technological advances and rising competition must be considered. In order to do so, new business models must be developed, portfolios improved, and processes have to be streamlined. In total, 82 percent of executives cited the need for innovation as an important driver of the need for business transformation.


IDC To CIOs: 60 Percent Of You Will Be Supplanted By Chief Digital Officers By 2020
“By 2020, 60% of CIOs in global organizations will be supplanted by the Chief Digital Officer (CDO) for the delivery of IT-enabled products and digital services.” In its presentation, IDC added that “some CIOS will find an opportunity to expand their role leveraging their experience in setting strategy, innovation, and relationships.” But why only 40% will be able to expand their role and the others “will be challenged to fill the growing gap for the CDO role”?


Enterprise Architecture Practice - Capabilities
Though Enterprise Architecture is not a very new practice, the maturity level is still not the optimal in most enterprises. Seeing the benefits that the EA function can bring to the table, many enterprises are attempting to setup the EA practice within, but are in fact struggling to get it right. EA not just science and not just art as well. It is a combination of art and science. Successful EA practice has been found to being able to demonstrate certain key capabilities. In the EA world, there is no such thing as 'one size fits all', as it is highly dependent on the enterprises' business, its objectives, goals, strategies and priorities, which is never the same across enterprises.


2014's Hottest IT Certification
With more than half of 2014 behind us, it's that time of the year where we look at IT certifications standings in real world IT. The right certifications can help earn tech workers premium pay or land the job they've been aspiring to. That's why knowing what is "hot" with employers is important when considering your professional development. Every quarter Foote Partners compiles their data in the IT Skills Demand and Pay Trends Report, and they speak with over 2600 employers to bridge the disconnect between job titles, job content and compensation. Read on to find out where the heat is in regards to IT certifications, salaries and employer needs.


Predicting the Role of Healthcare CIOs in 2020
Steele describes that as a feat of "clinical reengineering," one that required baking best practices into Geisinger's EHR system so they could be accessed at the point of care. The program, known as ProvenCare, is served to up in a variety of high-frequency care episodes, including perinatal care, COPD, hysterectomies, and hip and knee replacements. Add to that Geisinger's ProvenHealth Navigator, an advanced version of the patient centered medical home, and its participation in OpenNotes, which opens clinical progress notes to patients,


CIO interview: Glenn Murphy, London & Capital
CIO Glenn Murphy says that, as the global economy picks up, London & Capital’s IT department has had to shift focus. “We are moving away from the national economic uncertainty of the last five years, where cost-appropriate solutions were foremost on everyone’s mind,” he says. “There is more confidence in moving towards systems that add business value and deliver real-time value to our clients and front-office staff.” He says the IT department is underpinning the growth in business, creating systems to improve client reporting and management.


Facebook releases C++ libraries to ease Internet communications
The library, called Proxygen, could also help Internet-facing organizations prepare for the next-generation Internet data communications protocol, HTTP/2. "Even if they are not using C++, anybody who is following modern protocol development like HTTP/2, we are hoping they could look at Proxygen as a reference design," Matheny said. C++ programs most often use external Web server modules, such as CGI (Common Gateway Interface), to supply a connection to the network, which can be cumbersome and slow to set up and run.


Java 8 for Financial Services
Streams are a new way to work with data, as the name would suggest, as streams. Again like lambdas there is nothing you can do with Streams that you can’t do without them. It does however make your code a lot simpler and, as long as you understand it, easer to read and maintain. Lastly using these new constructs gives a lot more information to the compiler and JVM so further improvements can be made at runtime giving you better performance. There are a few gotchas like exception handling, debugging and infinite streams but we’ll cover those as we go along.



Quote for the day:

"The secret of managing is to keep the five guys who hate you away from the four guys who haven't made up their minds." -- Casey Stengel

November 05, 2014

Remote working puts business data at risk, study shows
Banks said that – even though eight in ten of the employees interviewed read or write work emails on the move, and around seven in ten work on electronic documents outside their office – businesses fail to provide tools for secure remote working, or put the right security policies in place. Fewer than six in ten respondents said their organisation had a remote working policy. Of those that did have a policy, over a quarter admitted they had broken the policy to work remotely, either knowingly or unwittingly.


Using PouchDB for Offline/Data Sync
PouchDB offers not only client data replication to remote servers, but also provides a robust key/value data store for the browser as well. And not only the browser, but any JavaScript environment with disk access, including Node.js. The PouchDB web site has an introductory tutorial that steps you through the process of building a simple single page app (SPA). The app is modeled after the vanilla JavaScript implementation of the excellent TodoMVC benchmark for JavaScript frameworks. If you’re looking for a great comparison of SPA frameworks by the way, I’d highly recommend checking out TodoMVC.


Driving Innovation with IaaS
New technologies and service models can change how businesses operate, and become key drivers in innovation and cutting back operational expenditure. Infrastructure-as-a-Service (IaaS) is one such model where servers and other resources are provisioned as required over the cloud. This model provides self-service, on-demand access to IT resources, which means users can create and access tools they need within minutes, instead of days, weeks or months.


BlackEnergy cyberespionage group targets Linux and Cisco
Variants of the BlackEnergy plug-ins developed by the cyberespionage group were discovered for both Windows and Linux systems. They enhance the malware program with capabilities like port scanning, password stealing, system information gathering, digital certificate theft, remote desktop connectivity and even hard disk wiping. Different selections of plug-ins are deployed from command-and-control servers for every victim, depending on the group's goals and the victim's systems, the Kaspersky researchers said.


A CIO fights to keep his tech options open
"The impact on customer choice and negotiating positions" is very strong, he added. The concern about a narrowing of choices isn't limited to platforms. The industry consolidations resulting from mergers and acquisitions could lead to the discontinuation of development work on certain systems. "That may force us to switch tools and vendors," Spears said. The impact of consolidation can be particularly acute in certain markets. The banking sector, in particular, may be the canary in the coal mine that offers an early sign of the risks of IT consolidation.


AT&T, Others Launch OpenDaylight SDN Alternative
OpenDaylight has seen some recent momentum with two code releases, and heightened support from its own member companies. Brocade will ship this month an OpenDaylight-based SDN controller. And initial skeptics HP and Dell have raised their investment and participation in the effort. Like OpenDaylight, ONOS delivers an SDN control plane featuring northbound and southbound APIs, and a range of management, control, and service applications. Initially targeted to service providers, the community’s goal is to extend the platform for cloud service providers, enterprises and mainstream deployments.


The Only Way to Save Your CRM from Failure
Data also decays naturally, compounding the effect of human error. Estimates put the rate of data decay at around 2 percent per month. It is a completely natural process, and it is unavoidable. As your contacts change jobs, get married, change email addresses or get promoted, your CRM will start to lose track. Looking closely at CRM failure rates, we have a range of statistics to work from. C5 Insight estimates that the failure rate of CRM software is around 16 percent. It says that this figure is “optimistic”, and puts its own estimates at 38 percent.


Despite skeptics, security awareness training for employees is booming
"Effective education is a non-trivial thing, and it takes a very solid understanding of the audience and how you're going to measure the effectiveness of that education," said Walls. "Within the industry, the history of security education has ignored all that. It doesn't worry about impact; it doesn't worry about [asking] 'Is this effective?' "As a result, the word on the street is that security training isn't worth the time and money," Walls continued. "It's the classic syndrome of blaming the tools … the fault lies with you, not the audience."


Why coding's cool for school
There are some initiatives leading the way here. Google's Made with Code, for example, provides great inspiration for young women by showcasing the diverse career routes taken by those with an interest in tech. And Capability Jane is another notable organisation, aiming to improve diversity across sectors by encouraging businesses to hire working mothers on a more flexible basis. Such initiatives are crucial in encouraging the next generation of young women to study STEM subjects with a view to a career in tech.


A Look at ETW – Part 3
Although a strength of ETW is its strongly-typed events, after seeing several examples which use more “generic” events yet still benefit from ETW and its tooling, I’m going to try that and go with a few general-purpose events. Several of the logging frameworks use the concept of “category” (or a dictionary of categories), so I’ve decided that might be useful here too. Since I want to trace both methods and code blocks I use “Action” and “actionName” to designate either. I also want to make timing optional: ETW events have a high-resolution timestamp and some tools will pair up start/stop events, so doing my own timing isn’t always necessary.



Quote for the day:

"Doing the same thing over and over, yet expecting different results, is the definition of crazy." -- Unknown