November 14, 2014

With $100 Million, Entrepreneur Sees Path to Disrupt Medical Imaging
The imaging system is being developed by Butterfly Network, a three-year old company that is the furthest advanced of several ventures that Rothberg says will be coming out of 4Combinator, an incubator he has created to start and finance companies that combine medical sensors with a branch of artificial-intelligence science called deep learning. Rothberg won’t say exactly how Butterfly’s device will work, or what it will look like. “The details will come out when we are on stage selling it. That’s in the next 18 months,” he says. But Rothberg guarantees it will be small, cost a few hundred dollars, connect to a phone, and be able to do things like diagnose breast cancer or visualize a fetus.


Solving the information and big data challenge with Artificial Intelligence
Semantic Understanding uses a linguistic approach to make sense of the text and locate key content in the email text body. For example, if it finds the phrase “I don’t want to cancel the contract”, it applies linguistic intelligence and recognises the whole sense of the communication and understands it is about a contract non-cancellation. In contrast, a rule based system would only pick up the word ‘cancel’ and understand Cancel Contract and then act on it contrary to the customer’s wishes. This is great stuff, also used by SIRI, Google NOW and the likes.


New iOS social engineering exploit reminds us to keep alert
The vulnerability has been confirmed to exist in iOS 7.1.1, 7.1.2, 8.0, the current iOS 8.1, and the 8.1.1 beta -- both on jailbroken and non-jailbroken devices. Each app on the App Store has a so-called bundle identifier, a numeric name that makes the normal-language name of the app superfluous. If a malware app is given the same bundle identifier as a standard App Store app, it can be installed over it if the user can be enticed to click on a link on a website or email message. This means that a carefully designed and targeted link to an app download could be sent to an executive or politician, with a socially engineered message "from" an associate meant to entice a user download of a "new game" or some other innocuous app.


Three information infrastructure myths debunked
The Information Management keynote session at IBM Insight 2014 brought new product offerings, memorable stories and answers to some common information infrastructure myths. Beth Smith, general manager of IBM Information Management, accompanied by special guest Grant Imahara of former Mythbusters fame, and a slew of IBMers led the audience on a systematic journey to debunk three specific misconceptions about information infrastructure one by one.


How to create a realistic enterprise strategy for cloud computing
"If you understand that this is just a platform change, it's not so scary," he said. "We have all moved to new technology … with cloud; we are just using things we don't own that sit on the open Internet." In some cases, that is certainly a nerve-wracking proposition. But it makes sense in others. For example, retailers that need to scale up or down quickly or expand storage at low cost find the cloud to be a good option and should develop a strategy for cloud computing.


Android 5.0 deep-dive review: Exploring Lollipop's many layers
Everything has been recreated to match the Lollipop look, right down to the Contacts (formerly known as "People") and Downloads apps -- although curiously, in the case of the latter, I'm seeing a version of the app on my Nexus 6 review unit that doesn't quite match the one on my Nexus 9. Given that the Nexus 9 received a software update prior to its consumer launch, I'm guessing that the Nexus 6 will soon be brought up to parity. The visual overhaul isn't just within Android itself, either; it's across Google as a whole. Though the desktop evolution is still underway, Material Design has slowly but surely been creeping into Google's various apps and services for a while.


Virtual Reality Aims for the Mobile Phone
Mobile seems a logical platform for the technology. When you find yourself fully immersed in a virtual realm, the illusion is compromised by the dim awareness that you remain attached to a PC via a cat’s cradle of wires. Mobile devices, theoretically, offer a more liberating experience. They’re not only self-contained but also cheaper to buy and run. And yet there are significant technological hurdles to overcome before the Gear VR, or its successors, can become mass-market products. “Heat is our primary issue,” says Cohen. “When you run a mobile phone’s CPUs and GPUs at maximum, the device heats up really quickly, and it needs to either cut the speed by throttling or shut down entirely.”



Automakers Agree on Guarding Car Computers From Hacking
The accord, to be announced today, calls for heightened security for information such as driver location and behavior, according to the Alliance of Automobile Manufacturers and the Association of Global Automakers, Washington-based groups whose members include General Motors Co. (GM:US) and Toyota Motor Corp. (7203) “As modern cars not only share the road but will in the not-too-distant future communicate with one another, vigilance over the privacy of our customers and the security of vehicle systems is an imperative,” John Bozella, president and chief executive officer of Global Automakers, said in a statement.


Chip Industry's IoT Facelift Comes With Security Wrinkle
Europe is already ahead of the US and most of the world in building out the infrastructure for the cloud and connectivity, according to Ploss, thanks to the infrastructure it has in place from its leadership in smartphones. Rick Clemmer, executive director, president, and CEO of NXP, was more emphatic regarding Europe's advantage, particularly with respect to security for IoT. "US is a leader in the Internet, but is a third-world country in security," he said. Still, said Clemmer, usability is a key issue for IoT devices, especially, as Bozotti pointed out, when the users themselves are becoming older as part of a general aging of the population, which creates even more pull for smarter cities -- based on easy-to-use devices.


What CIOs Can Learn From the Biggest Data Breaches
The worst data breaches are sometimes left unsolved, but security professionals can sometimes piece together the root cause. Idan Tendler, the CEO of security analytics company Fortscale, says it's possible, based on unconfirmed reports, that the JP Morgan Chase breach of 83 million customers' persona data happened after hackers obtained a list of the applications that run on the bank's internal servers. Once hackers had the list, they searched for known vulnerabilities for each application until they found a way to break in. They then obtained administrative privileges to gain access to the servers.



Quote for the day:

"The key element in good business management is emotional attitude. The rest is mechanics." -- Harvey Geenan

November 13, 2014

Are You Sweeping Big Data Privacy Under the Carpet? 5 Things to Do Instead
Admit it: When you read or hear about big data privacy, you’re ready to move onto the next topic or swipe to the next screen. Or sweep it under the carpet. You know the discussion is important, but let’s be honest: it’s not exciting, it’s sometimes creepy, and it’s not easy to navigate its complexities. ... There’s no question that we all play multiple roles—i.e., that of a consumer, citizen, private sector employee and/or government worker—and that our time is limited, so what can we do? For starters, I suggested five options during my presentation. Here’s the Cliff Notes version:


Software Defined Networking - What's New?
This presentation will give a look at the Open Data Center Alliance rev 2.0 software defined networking (SDN) usage model that incorporates network function virtualization, and five new usage scenarios.  SDN is no longer considered an emerging technology; the technology is proven, although it is still at an early stage in its life cycle. In comparison, NFV is at an earlier stage of development, but because the technology effectively complements SDN and is important to service providers, NFV is likely to be widely adopted across the industry. To improve evaluations and decision making, IT departments and cloud subscribers will require standard features and defined metrics.


Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PCs
“Running expired antivirus software can give people the impression that it is still protecting them even if it hasn't downloaded updates in a while,” says Tim Wilson, director of cybersecurity and cloud strategy at Microsoft. “However, data from our latest report indicates that running expired antivirus software is nearly as unsafe as having no protection at all,” Wilson said in comments emailed to Dark Reading. The malware infection rates on Windows 8 clients with expired antivirus tools were almost as high as the infection rate in PCs with no protection at all, the Microsoft researchers discovered.


Global Banking and Big Data: The Challenge of Anti-Money-Laundering Compliance
A series of high-profile decisions by the U.S. Department of Justice against BNP Paribas, JP Morgan Chase, Barclays, and other large, global banks resulting in multi-billion-dollar fines has brought anti-money-laundering (AML) to the top of the financial services industry’s priority list. While the first wave of investment in big data tools and technology has heretofore been targeted at the identification and prevention of nefarious activities that lead to direct costs for banks, payment processors, and their customers, spending in the near term may likely be related to compliance with three key pieces of AML regulation


Top 10 tech conspiracy theories of all time
The appeal of the conspiracy theory is rooted in its own essential slipperiness. In terms of technical definition, a conspiracy refers to multiple persons or groups working together toward some kind of shady result. But in popular culture, conspiracy theories can be plausible or impossible, true or discredited -- and everything in between. Here we take a look at the 10 most infamous conspiracies and conspiracy theories that have made the rounds in the world of high tech.


7 Trends That Can Define the Future of Cloud Computing
There are two big reasons that leaders across every industry are gung-ho about the Cloud. One reason for this huge confidence in Cloud computing is that it is one of the most disruptive technologies to have emerged on the scene in the last decade. The second and what I think is a far more critical reason is what the Cloud, its adoption and application promises for the future. It is when business owners “foresee the future” of the Cloud that they say to themselves, “Yes, this is the technology that I want to tie my business fortunes to”.


Microsoft's Answer To Death By Email: Meet Clutter
Clutter relies on Office Graph, a machine learning technology that maps the user's relationship with people, events, documents, projects, and other types of information. Office Graph allows Clutter to recognize that a user has ignored a co-worker's email about his new cat but read and responded to another colleague's message about an upcoming campaign, for example. Observations such as this help Clutter determine which messages to prioritize. From the user's perspective, Clutter operates something like Gmail's importance ranking, but in reverse; whereas Gmail partitions emails it deems "important" into a secondary folder instead of in the main feed, Clutter puts the important messages front and center, with less important content relegated to a "Clutter" folder.


Unlock Your Computer and Websites with a Glance
The Myris is a squat, palm-sized cylinder that connects to your PC with a USB cable. Its underside has a small mirror in the center with a small camera lens next to it. Any time you meet a login screen after the device has been set up, you hold up the Myris in front of your face so that both eyes are visible in its mirror. A few seconds later, a green ring lights up to signal that you’ve been recognized, and the device’s companion software will log you in without your having to touch a key. You can do that for websites, for desktop applications, or to log in to your user account on a computer.


Are Legacy Vendors Pulling OpenStack in the Wrong Direction?
Over the past couple of years, OpenStack has turned from a small skunkworks effort to build Amazon Web Services-like clouds but open source into a movement backed by some of the IT industry’s biggest legacy vendors. It’s not uncommon nowadays to hear that OpenStack has become the de facto standard for building cloud infrastructure. Such mainstream support, however, comes at a cost, threatening to detract from the project’s original goal. That’s according to Jim Morrisroe, CEO of Piston Cloud Computing, a San Francisco-based startup co-founded by Joshua McKenty (one of OpenStack’s founding fathers) that helps customers stand up OpenStack clouds of their own.


Introducing Essence#: A Smalltalk-based Language for .NET
The Essence# compiler generates DLR dynamic call site for each and every message send, regardless of the receiver. The compiler does not and cannot know the type of the object that is receiving a message, so it just emits a DLR CallSite for all message sends, and the CallSite for a message send is always an instance of the ESMessageSendBinder class. An ESMessageSendBinder figures out, at run time, how to implement the message send. That’s done one way in the case of native Essence# objects, done another way in the case of the CLR primitive types, done yet another way for any non-essence# objects that implement the IDynamicMetaObjectProvider interface



Quote for the day:

"You can, you should, and if you’re brave enough to start, you will." -- Stephen King

November 12, 2014

Open-source .NET, free Visual Studio, support for Linux, Mac, Android and iOS
As part of the change, Microsoft will give developers the ability to use the .NET runtime and framework to make server- and cloud-based applications for Linux and Mac. Microsoft is also releasing a new, full-featured version of Visual Studio 2013 that will be available at no cost to independent developers, students, small companies and others not making enterprise applications. And the company is releasing a preview of Visual Studio 2015 and .NET 2015 with new features for building applications that run on platforms including Windows, Linux, iOS and Android.


Dealing With the KPI Terminology Problem
And remember, ‘KPI’ is just one of the many performance management terms that does not have a standardised, universally accepted definition. I have no idea how this problem of varying terminology is going to be resolved, and that’s not the intent of this article. The intent of this article is to give you a contextual framework to make sense of where ‘KPIs’ – or performance measures, or whatever you call those quantitative pieces of evidence of our performance results – should fit. So let me tell you my definition of these terms, and then you can map your own terms to my meanings and thus avoid distraction and confusion when you try to make sense of your own strategy.


Alcatel-Lucent pins growth on R&D, enterprise
"Our customers need a network that can scale quickly, and break down silos in between the different technologies,' Combes said. "SDN [software-defined networking] makes network resource as easily consumable as compute and storage. We strongly believe that the answer to complexity is around NFV [network functions virtualisation] and SDN combined." Although Alcatel-Lucent was reducing its size globally, investment in the company's Bell Labs research division remains at €2.2 billion year on year, Combes said, with divisions opening in Israel and the UK. "You can expect a very strong Bell Labs in the next few years because that is a key differentiator for us," he said.


IT still not ready for IoT
Despite the benefits of connected devices, more than half (51%) of respondents believe the biggest challenge regarding the Internet of Things is increased security threats, while a quarter (26%) are concerned about data privacy issues. Two-thirds (68%) admit they are very concerned about the decreasing level of personal privacy. More than a quarter of respondents say the general public’s biggest concerns about connected devices should be that they don’t know how the information collected on the devices will be used (28%) or they don’t know who has access to the information collected (26%).


Update now, Windows users: Microsoft patches critical (and old) security flaw
Microsoft has issued emergency patches for a flaw that affects all supported versions of Windows. It’s a nasty one – a vulnerability in Windows’ implementation of the protocols for encrypting internet communications. The critical flaw lies in Secure Channel (Schannel), a security package – used by Internet Explorer — that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. While there’s no evidence of its exploitation yet, it allows attackers to remotely execute code on the target’s machine and take it over, so it is imperative that all Windows users run an update immediately.


IndependenceIT: 'Switzerland' Of Virtualized Desktops
IndependenceIT is trying to make it practical to provision and sustain virtualized end-users, a goal that has tended to recede about as fast as many companies have approached it. Implementing virtual machines for end-users who have varied needs, little tolerance for slow-functioning desktops, and a likelihood of being mobile at some point has complicated the deployment of virtual desktops and, in many cases, delayed it. Individualized desktops that each need to be stored drive up storage costs. Power end-users require a delivery protocol that prevents jitter in the multimedia and video they view. When the end-user disconnects from the corporate network, what then?


SDN meets the real world, part two: SDN rewrites the WAN manual
Wide-area networking (WAN), the part of the enterprise network between applications and end-users, is traditionally slow, expensive, and inflexible — and hence, ripe for innovative new approaches. SDN is broadly applicable to other parts of the networking requirement, so offering up a pool of resources that can be programmatically controlled by software should be explored in different contexts and settings. This report lays out a conceptual approach whereby SDN can be applied to the WAN to drive cost savings, agility, and flexibility for enterprise customers.


Samsung And SAP Partner On Mobile Devices For Business
“Increasingly, our customers are away from the desk and require a fundamentally new way to interact with the enterprise applications to align with how they work today,” said Steve Lucas, president, Platform Solutions Group, SAP, in a statement. “The applications that match the current trends in mobility must work to create a seamless experience as the work modality embraces mobile devices, wearables, Internet of Things and other alternative forms of mobile computing. Through our partnership with Samsung, we are working on plans to offer a premium mobile enterprise experience for customers.”


Lack of in-house skills stymies IaaS migration, says report
Reconnix CTO Steve Nice noted a “clear desire for business to move away from traditional environments and towards IaaS providers”. “It’s natural for many businesses to err on the side of caution, but this conservative approach can mean that many are missing out on the transformative benefits of the cloud,” said Nice. “It’s clearly a confidence issue, and the challenge is for IT departments to take the necessary steps to prepare themselves for inevitable change. “By failing to take action now, they risk putting themselves at a technological disadvantage to competitors, or being caught blindsided and forced to rush through a migration that could end up costing over the odds.”


Don’t Surround Yourself With Smarter People
Freedom is therefore implicitly freedom to win in a specific sense. This is not an accident. Any time you define freedom in terms of capacity for action (intrinsic and situational), you’ve defined freedom in a finite-game (Carse) way. Increasing freedom becomes a matter of increasing your capacity for victory over increasingly capable opponents, until you’ve defeated them all. Stated another way, freedom to win is freedom to get smarter in the sense of a given finite game. Freedom in a finite-game sense is always freedom-to-win (and therefore, freedom to stop playing at some point).



Quote for the day:

"Look for people who will aim for the remarkable, who will not settle for the routine." -- David Ogilvy

November 11, 2014

Big Data Survey: Trouble Brewing For IT
Enterprises are faltering in their ability to comprehensively analyze big data, and IT has opted to walk away. Look, for years IT organizations have been told they don't own enterprise data, the business does. Lately we've heard about the rise of the CMO and how it takes that mindset to really know what data matters and how to mine it. So the message too many IT teams seem to be taking away: "This isn't an IT problem. We build the systems, keep the lights on, try to keep attackers out. We don't own big data. Our input isn't wanted."


Rackspace Launches Azure Services From Data Centers
Microsoft's partnership with Rackspace looks a lot like VMware's moves in the same hybrid cloud space. It launched its own vCloud Air data centers, offering VMware-compatible public cloud services. But it also commissioned a wide variety of regional providers to offer vCloud services, calling it the vCloud Air Network (versus Microsoft's Cloud OS Network). At the same time, Rackspace's adoption of private cloud packaging inside its cloud data centers is another step back from the brink. In May, it hired Morgan Stanley to act as an agent to explore the possibility of being acquired or taking on a tight partner relationship.


Are fingerprints PINs or physical artifacts?
“Courts are essentially wrong distinguishing between various methods of encryption and decryption,” said Rasch. “They are all, at their core, a mechanism for protecting the privacy and security of data. Indeed, a person encrypting a drive with a biometric would have cause to believe that this was more secure, and that they had a greater expectation of privacy in the biometric than they do in a simple four-digit PIN. To say that announcing the numbers ‘2580’ as a password is testimonial incrimination, but handing over a complex PGP key, or causing a complicated mathematical calculation based upon a biometric is not testimonial misses the point.


Why Your 2015 Plan Needs To Include Data & Analytics Governance
An extremely important aspect of a centralized data governance group is representation from various stakeholders across the organization. Even the word “analytics” means very different things across the different groups within your organization. Finance, web, marketing, customer and business teams all generate and use data in very different ways, and often these data sets can end up living in isolated silos. And, beyond your own organization, keep in mind that there are typically many third parties and agencies you’re working with, and often organizations will choose to bring in an external specialist or consultant to provide insight into trends and new opportunities in the data & analytics space.


SaaS: The dilemma of visibility and control
The supply of SaaS solutions is increasing and will continue to do so at an ever increasing pace. According to Forrester Research (Application Adoption Trends: The Rise Of SaaS) SaaS spending accounts for the 23% of the application software budget. However, it grew a whopping 53% over the previous year (4Q 2012-4Q 2013). In addition to customer relationship management (CRM), SaaS adoption is strong in human resources management, collaboration tools, and e-procurement. Forrester is also seeing a dramatic increase in SaaS interest in business intelligence (BI) and several other application categories.


Here's what your tech budget is being spent on
Andrew Horne, managing director at CEB, said IT departments are introducing more flexible budgeting and making better use of cloud computing which allows them to reallocate budget to innovation. The CIO's attitude towards innovation is often tempered by a big dose of caution, so much so that they have started to lose responsibility for innovation projects to other managers. Meanwhile, IT chiefs are finally waking up to the threat coming from shadow IT, where other execs have been getting more interested in developing their own digital projects outside of the control of the CIO.


10 bad technology decisions that can come back to haunt you
As organizations build their tech roadmap for the years ahead, the wrong choices and strategies could have unfortunate repercussions. Here are some pitfalls to watch out for. A bad strategic or tactical move can unleash an avalanche of negative effects on your organization, some lasting for years to come. Here are some of the worst of the worst -- and a few suggestions on how to avoid them.


Cures For The Common Help Desk Headaches
With all three of the most common help desk headaches, though, you need to go beyond technology and look to training and cross-departmental collaboration to really build skills into your corporate cultures. Defining a technological skillset matrix for your team will reveal gaps in knowledge. A simple "X skills needed, Y people on the team with a 1-, 2-, or 3-rating per block" will show where you need to provide more training and where you can hold a related session in a conference room each month.


Why Hire Veterans? They Bring a Lot to the Table, Say CompTIA Members
Veterans do bring a lot to the table, agreed Aaron Woods, director of USSP relationship and partner programs for Xerox Corp.’s Global Customer Service Delivery and a six-year veteran of the U.S. Army. “All veterans have attained a number of skills while in the military that would fit the needs of any employer,” Woods said, citing teamwork, leadership, discipline and the ability to follow a chain of command. IT companies should consider the specific traits that veterans possess, like being team-focused and disciplined with a strong drive to complete a task. “The ability to work in a team environment is one of the most important attributes a veteran will bring to an IT company,” he said.


Hire Self-Motivated People — the Single Smartest Thing a Hiring Manager Can Do
A self-motivated recruiting prospect, candidate, or employee is an individual with a track record of having the internal drive and motivation to begin and continue tasks without external prodding or extra rewards. You don’t have to identify why they are so driven. Just be satisfied with the fact that it is something in their character, upbringing, training, or attitude that drives them to work without any external stimulus or threat. Once you bring this recruiting approach to any hiring manager’s attention, they almost instantly appreciate its value. But if you are cynical, I have listed below some of the many benefits that come from hiring self-motivated people.



Quote for the day:

"Everything you want is just outside your comfort zone." -- Robert Allen

November 10, 2014

Google releases tool to test apps and devices for SSL/TLS weaknesses
The tool includes a client component for Android and Linux systems that tells the MitM component what specific tests to run. The client is also important for tracking which applications that run on the tested systems opened certain SSL/TLS connections, something that can be hard to determine just from the MitM side. Nogotofail can check for weaknesses like vulnerabilities in third-party SSL/TLS libraries, susceptibility to attacks that strip the SSL/TLS or STARTTLS encryption and improper certificate validation, a widespread problem in applications.


How enterprises will use the cloud for big data analytics
Compatibility, security, and performance concerns have kept enterprise organizations from being completely comfortable with the idea of moving their complex core applications to the cloud. Without a seamless application migration blueprint, the project can seem more like a headache — and a risk — than it’s worth. This report, which is based on a survey by Gigaom Research and sponsored by Cazena in September 2014, reviews the different considerations when moving some or all big data-analytics applications to the cloud. The report is will give guidance to CxOs, IT and business leaders, and decision-makers at software as a service (SaaS) companies and cloud service providers.


Linux Foundation: Open Source is Eating the Software World
There is a wholesale shift in the enterprise software world from using a little bit of open source code here and there to an 80-20 split, where 80 is the open source portion, he said. The reason for the shift is quite simple: software has become a way for an enterprise to add value, and open source is the best way to use a lot of software. “There is too much software being written for any organization to write that software on their own,” Zemlin explained.


Become a great listener
To succeed in today’s business world, leaders must be proactive, skilled listeners. Leaders who make themselves accessible for conversation and listen regularly are well-informed of the goings on in their workplaces. They better understand others’ opinions and attitudes and are able to take this information into consideration when making decisions. There are other benefits to listening well. One is building trust. Effective listening conveys a sense that the leader cares about her people, their thoughts, opinions and concerns. A leader also builds stronger commitment within others when people feel that she cares about them personally as well as in how they fit within the organization.


The Half-Life of Data [INFOGRAPHIC]
Radioactive substances have a half life. The half life is the amount of time it takes for the substance to lose half of its radioactivity. Half life is used more generally in physics as a way to estimate the rate of decay. We can apply exactly the same principle – the rate of decay – to business information. Like natural materials, data is subject to deterioration over time. In science, the half life of a given substance could be milliseconds. It could be many thousands of years. The half life of data has been measured, and it may be shorter than you were expecting.


Security Think Tank: Guidelines for dealing with Shellshock
It is useful to know that there are many other shells that may be utilised in Unix deployments. However, bash is the default shell for both Linux and Mac OS X. The use of both of these operating systems is popular for enterprise and home applications. This vulnerability has been present in Bash for around 22 years. Chet Ramey a senior technology architect at Case Western Reserve University in Ohio, has been maintaining the Bash open source project and believes Shellshock dates back to a new feature introduced in 1992.


Emerging tech under standards scrutiny
We want the standard to support that sort of rapid development. In the public cloud, you can spend small amounts of money to get a prototype working, and then think about rollout and production – that's the point at which you should be thinking about long-term interoperability and questions like ownership and data recovery." In every aspect of the Open Platform 3.0, security is a concern, along with related topics of identity and privacy. Says Harding: "Security is a key concern, and so is identity. You need a framework to identify who owns the data, who is trying to access it.


Raids cast doubt on integrity of TOR
This makes it unclear whether these authorities have broken Tor to the point that it can no longer mask the location of its infrastructure or whether they found them using other intelligence. Tor relies on volunteers who host nodes of the network. Traffic bounces around within Tor in order to disguise where it comes from, but exit nodes and entrance nodes would yield the most useful information about actual IP addresses connecting to Tor. “Law enforcement could try to get in that first layer and see the sources and therefore try to reduce the anonymity as much as possible,” says Ben Johnson, chief evangelist at Bit9+Carbon Black.


Look out OpenDaylight, there's a new open source SDN controller
"It's a distributed core that runs on multiple servers," Appalaraju said. "Each instance is identical and they cooperate together to form a single system. If you need more control plane capacity, you add more servers. It also has high availability. If an instance fails, the workload is seamlessly distributed to other systems." ONOS also has carrier-grade persistence. The state of the entire control plane is stored on every instance at once, which enables hitless updates. Like OpenDaylight, the southbound abstraction layer of ONOS uses multiple protocols, including OpenFlow, to interact with network infrastructure.


Leveraging Three Tiers of Health Data
With Meaningful Use, you have to be able to email patients and share data among and between other physicians, et cetera. People are getting certified for MU, but if you actually look at the rules they don't say you have to do it 100 percent of the time. They say you have to have an electronic medical record with a problem list on x number of patients, and that keeps escalating over the years. The same is true with with email. I think we're about halfway there. In my experience it's not there, but I know what MU is about and that people are getting certified.



Quote for the day:

"The best strategy for building a competitive organization is to help individuals become more of who they are." -- Marcus Buckingham