January 09, 2015

2015: The year the Internet crashes. Hard
Finally, let’s not forget good old human error. Logins and passwords are also being swiped by cyber-crooks from companies all the time As former FBI director Robert Mueller said this summer, “There are only two types of companies — those that have been hacked, and those that will be.” Even the tech elite are vulnerable. Earlier in December, ICANN, which oversees DNS, was hacked. The attacker got access to user information, including email and postal addresses. ISC, makers of BIND, the world’s most popular DNS software, also got hit, but we don’t know what, if any, information was taken from the site.


Denmark throws down $75m to build up offensive cybersecurity capabilities
Most of the initiatives outlined in the strategy however discuss better cyber-preparedness by government agencies, their suppliers, and private sector critical infrastructure providers. Danish defence minister Nikolaj Wammen said of the threats facing the country: "there are external actors exploiting the internet to spy on Denmark and to steal trade secrets." If Denmark is building up its cyber-offensive capabilities, it joins a growing list of nations whose intelligence services have used malware to spy on foreign targets or, as in the case of Stuxnet, used it to target other countries' national infrastructure.


3 Practical Tips for Effective BI Dashboard Design and Implementation
According to the preeminent expert on data visualization and analysis, Stephen Few, a dashboard is a “visual display of the most important information needed to achieve one or more objectives; consolidated and arranged on a single screen so the information can be monitored at a glance.” The challenge is not necessarily building the resources to display, it’s to design and present these resources effectively and in a way that makes the processing of the information quickly. That leads us to an overarching and significant dichotomy of sorts in the BI universe. A BI solution has a number of interrelated components, and if you want a BI solution that’s successful and sustainable, all of these components need to be wrapped together harmoniously.


Cloud, Mobility, Big Data Key To Growth In Managed Services Space
“Many managed service providers have backgrounds as technicians, so there is a constant focus on taking advantage of technology innovation. Most solution providers are also starting to look toward moving into that environment, where they have end-to-end control,” he explained. The strongest MSPs are looking at how to enhance their offerings around mobility, cloud computing and big data, he said, but noted that the latter may not yet be ideal for all clients. “I think people use the term ['big data'] but don’t yet know what it means in the managed services provider space. From a solution provider’s perspective, we have to look at our client’s perspective and see if this can actually help them,” he said.


The era of big data won’t materialise without fast data
Enterprises could spend years, even decades making sense of the information they’re collecting. However, the current business climate requires, above all else, agility, and in order to remain competitive, organisations must be able to make decisions at near-real-time speed. Furthermore, as applications are required to meet increasingly demanding SLAs, this requires the ability to process data as rapidly as it is being generated. With traditional computing, this isn’t possible. The need to process exponentially growing datasets instantaneously will undoubtedly prompt innovations that haven’t even entered the big data discussion yet.


Radware 2014-15 Global Application & Network Security Report
This year’s report illuminates how security attacks are more complex, even as macro-IT trends contribute to the dissolution of security effectiveness. Research confirms that the motives, means, and effectiveness of security attacks are on the rise – and it also highlights the need for greater agility to quickly adapt to evolving threats. In addition to results survey, expert analysis and data visualization, the report also includes a checklist that can be used for evaluating your preparedness for attack detection and mitigation capability. This tool should prove valuable in assessing your attack resiliency.


8 Skills to Look for in IT Project Managers
As the economy continues to climb out of recession, demand for project management professionals has skyrocketed. Finding the right project management talent for mission-critical IT projects can be difficult, as the role requires a unique mix of technical and soft skills. In addition to the usual suspects -- attention to detail, focus on process, time management and capability to multitask, for instance -- there are some less obvious, but equally crucial, skills that separate the good from the great. Here, our experts weigh in on what to look for when hiring IT project managers.


EMC to Leverage Big Data to Target Channel Marketing Dollars
While EMC is among the furthest along in terms of leveraging big data analytics in the channel, it won’t be too long before every major vendor is heading down the same path. While it may be a while before big data analytics can be applied against the entire small-to-medium (SMB) category, it’s clear that as far as large accounts are concerned vendors intend to leverage big data analytics to more tightly align channel partners with their internal sales staffs. In fact, the goal is nothing less than to both uncover and then lock up sales opportunities long before any actual request for proposal actually gets generated.


Apple has a serious problem with software quality
What started out as robust and stable ecosystems have increasingly become buggy and problematic. For me the problems don't appear to be anywhere near as bad as they became on the Windows platform, but they are getting there. If things continue as they are, I can foresee a future where an iOS or OS X release is as buggy as Windows Vista was when it was released. Ironically, Microsoft has been working hard to clean up its act, although the current situation, where patches are being pushed out to fix problems caused by earlier patches is horrendously messy. And while we are on the subject of patches, Apple is slow when it comes to delivering fixes for problems, and far too many never get fixed and end up being rolled forward to the next major release, which is just unacceptable.


Personal Healthcare Data: Patients Will Take Control
It’s a very different look and the doctor is now a partner. Patients have more equal footing because they have the power of their own data and information. They get to choose whether they’re going to share it, who they are going to share it with, and when they are going to share it. In effect, they own the data, which they never owned before. Most consumers do want their data. Every survey suggests that 80 percent want it. Most physicians don’t want to give the data. Seventy percent will not give copies of office notes to patients and almost the same percent won’t even email with patients. So, we have a mismatch of what consumers want and what the dominant proportion of doctors are willing to give and do.



Quote for the day

"Most discussions of decision making assume that only senior executives make decisions. This is a dangerous mistake." -- PeterDrucker

January 08, 2015

Using the Kanban Canvas for Driving Change
Systems Thinking uses the iceberg metaphor, where individual events are what we see above the water line. Below the water, often unobserved, are the patterns of events over time. Below that are the system structures that create those patterns, and even further down are the mental models that lead to those structures. To begin to understand the systemic problems we want to address, we first need to look for the patterns. One way of finding patterns is through narrative. I ask people to tell stories about what has happened in the past, over time.


Corporate officers — security changes for 2015!
CSOs rarely quantify a return on investment, as the rest of your department heads can. Instead, CSOs talk about threats to other companies, and deep down you’re wondering who would have both the inclination and capability to attack your company anyway? You have firewalls, and you’re forced to memorize (okay, write down in your secret place) longer and longer passwords that NOBODY could guess. You’re compliant with your industry standards, such as PCI (for payment cards) and HIPAA (health records), so you must be protected. In short, you need to trust your CSOs to do their jobs, just as you trust your CFOs — in the same way that President Reagan trusted the Soviet Union to disarm: “Trust but verify.”


We Don’t Have Time for Risk Management
Unfortunately, that kind of response is not unusual or unfamiliar to even basic risk management questions, particularly when there is a pressing need for results. Risk management is time consuming and consequently costly but it is often more costly to rush forward without considering risk, because when the unexpected happens, we have to react, which involves delay, rework, and sometimes waste. In Gene’s case, not considering the areas of uncertainty means that important areas of planning might be overlooked; potentially impacting work, schedule, and cost expansion by unknowingly accepting significant liabilities related to property and safety. Part of the problem is that Gene (like many) thinks of risk as interference to his plans and timelines.


Merging Old and New: Embracing the Hybrid Cloud
It requires careful planning to manage a private cloud and a third-party public cloud host. But for companies that want to get the benefit of new technology while still needing to provide bullet-proof continuity of operations, the old and the new need to work together. Many established companies with significant IT infrastructure are making the decision to develop a hybrid cloud. For example, NiSource Inc., one of the largest natural-gas transmission companies in the U.S., recently said that it plans to move to a hybrid cloud.


How to boost creativity in your organization?
“Being creative is going to be associated with a lot of failure,” says Dr. Lynne Vincent, co-author of Outside Advantage: Can Social Rejection Fuel Creative Thought? “You have to have the confidence to persevere and continue on past the hurdles and barriers.” People say they value creativity, but in reality they celebrate the successful outcome of its implementation. I have seen many organizations stuck in a creativity slump as their employees focus too much on what they’re working on and they don’t see the forest for the trees. One question I am asked often times is: how do I boost creativity in my organization?


How To Use BGP Prefix-Independent Convergence
BGP Prefix-Independent Convergence is described in a draft RFC, which initially came out in September 2012 and was updated a couple of times in 2013 but is currently in an expired state with the IETF. Cisco does support PIC on all their routing platforms (IOS, IOS-XE, IOS-XR and NX-OS). The BGP PIC edge and core for the IP and Multiprotocol Label Switching (MPLS) function improves convergence after a network failure. This convergence is applicable to both core and edge failures on IP and MPLS networks. Normally, BGP can take several seconds to a few minutes to converge after a network change.


Internet of Things demands security by design
"Connected devices are effectively allowing companies to digitally monitor our otherwise private activities," Ramirez says. ... She points to "ubiquitous data collection" and the potential for consumers' information to be used or shared in ways they would not expect as particular areas of concern, along with the worry that manufacturers and service providers aren't adequately securing the data they collect. ... "The small devices are sort of a problem. You have limited capabilities in terms of computation," says Joseph Lorenzo-Hall, CTO at the Center for Democracy and Technology, a Washington digital rights group. "Some of them are meant to be very disposable and lightweight, which is going to be difficult to maintain and make a business case and do security upgrades for."


Why CIOs Should Turn To Cloud Based Data Analysis in 2015
CIOs are under tremendous pressure to quickly deliver big data platforms that can enable enterprises to unlock the potential of big data and better serve their customers, partners and internal stakeholders. Early adopter CIOs of big data report clear advantages of seriously considering and choosing the cloud for data analysis. These CIOs make a clear distinction between business critical and business enabling systems and processes. They understand the value that the cloud brings to data analysis and exploration and how it enables the business arm to innovate, react and grow the businesses.


Introduction to Puppet
unlike procedural scripts, Puppet’s language works across different platforms. By abstracting state away from implementation, Puppet allows you to focus on the parts of the system you care about, leaving implementation details like command names, arguments, and file formats to Puppet itself. For example, you can use Puppet to manage all your users the same way, whether a user is stored in NetInfo or /etc/passwd. This concept of abstraction is key to Puppet’s utility. It allows anyone who’s comfortable with any kind of code to manage systems at a level appropriate for their role. That means teams can collaborate better, and people can manage resources that would normally be outside their ken, promoting shared responsibility amongst teams.


Next Shift: From Big Data to Deep Data
As big data moves beyond hype to realized value, things are beginning to change. As we enter 2015, companies will move toward the "Deep Data" framework– an approach based on the premise that a small number of information-rich data streams, leveraged properly, can yield more value than masses of captured data. By shifting to a deep (rather than big) data approach, businesses are able to better understand their customers and offer actionable, scalable and customized insights while crucially enhancing the value of the economic investment in data to their businesses.



Quote for the day:

"Because a thing seems difficult for you, do not think it impossible for anyone to accomplish." --Marcus Aurelius


January 07, 2015

Risk Management through people
The Future of Risk Management is not just looking through the windshield; scanning the horizon might just be the most important thing to do, you cannot control or stop what is coming, you have to prepare to respond to it. So many organisations spend large amounts of money to focus and report only on what is happening inside the organization, where they actually have control. Your biggest risks are outside of the organization, where you have no control.  Key elements for the future of your risk strategy should include internal networking; you have to talk to the informal groups and their informal leaders just as much as you do talk to the executives and managers, maybe even more.


The CISO Challenge: Articulating Data Worth and Security Economics
If you are an online retailer and your web server goes down because of a major denial of service attack, what does that cost the business? How much revenue is lost every minute that site is offline? Enough to put you out of business? See the figure below that illustrates how to approach this conversation. If the impact of a breach and the risk of losing business is high and the investment in implementing a solution is relatively low, the investment decision is an obvious one (represented by the yellow area in the upper left corner). ... Another dimension Dave described is communicating the economics of a solution that could prevent an attack based on the probability that the attack would occur (see next figure below).


New Years Resolutions
Well, every post on this blog is designed to help with one of the many challenges of enterprise modeling – and so I thought it might be interesting to look at how I could model my New Year’s resolutions in ArchiMate. ... For one thing, a diagram is a lot more of a visual thing to print out and post on my wall – much more so than a simple list. ... Well, resolutions are all about setting goals to achieve desired results, so something from the motivation viewpoint seems right. Realizing my goals…let’s go with the goal realization viewpoint. The goal realization viewpoint permits Goals and Requirements, Principles and Constraints.


I want in! Sentiment analysis gives mobile app users a voice
At its most basic, sentiment analysis is about collecting and analyzing a set of textual data in an effort to extract or characterize the attitudes, opinions and emotions contained within, according to a set of predefined criteria. It does this through a combination of natural language processing techniques and textual data analysis, with a dose of computational linguistics tossed in. Sentiment analysis has been around for a few years now and has been used in a number of applications, often by consumer-focused companies. Today it is being taken to a deeper level as a driver of big data initiatives, as enterprises start to gather and assess customer sentiment on a large scale across multiple input channels.


Data Quality Predictions for 2015
The champagne has been drunk, the mince pies are eaten and we’re packing away the Christmas baubles for another year. After a well-earned rest, thousands of businesses are returning to face the challenges that the New Year will bring to their business, and that means refocusing efforts on quality, usable data. But the world of IT rarely stands still, and 2015 will bring immense change that will intensify our use of data and change our dependence on it.


Heatwave, Cooling Failure Bring iiNet Data Center Down in Perth
An unusually warm day coupled with what iiNet said was multiple air conditioner failure meant that some servers needed to be shut down. It was the hottest January day on record for the area since 1991, and the heatwave is expected to continue into the week.iiNet is the second-largest DSL Internet provider in Australia. Email and corporate websites went down; thousands of customers ended up offline. ... “We have had multiple air conditioners fail on site causing temperatures to rise rapidly,” company representative Christopher Taylor said in a forum post. “We have additional cooling in now. We will begin powering services back up once the room has cooled adequately. If we are premature the room won’t recover and risk the A/C failing again.”


In IoT standards battle, there is no neutral zone for this CTO
IoT capability has tremendous importance to Electrolux, Brockmann said. Take ovens, for instance. The appliance maker will be putting cameras inside ovens so a cook can check on how the roast chicken is progressing. In a true IoT world, the image of a browning roast ought to be viewable on any device, including TVs. But it won't happen if electronics vendors don't agree on protocols. By connecting products, the appliance maker can establish a lifelong relationship with the consumers, send recipes, deliver preventive maintenance, and offer information about new products, Brockmann said.


Evolution of containerization extends its cloud reach
"People are rethinking how they can deploy cloud applications as these distributed containers with loosely coupled data layers. … Docker folks are responding to that by making these things more lightweight and ultimately better-performing," Linthicum said. What does the future of containerization look like? As multi-cloud deployments increase, containers that are able to live-migrate from cloud to cloud -- as well as well-designed applications localized in containers and decoupling databases -- middleware and security creates this orchestration of containers, according to Linthicum.


Why You Need to Move Your Data Center to a Software-Defined Paradigm
In the new software defined paradigm you can find completely new approach to operating — no RAID related calculation, no SAN setup, no Zones creation, no special cabling or special switch hardware, architectural unlimited space and performance scaling. Standard 10 Gbps Ethernet network is enough. Disks, nodes, and rooms, are all suitable replication locations, which guarantee multiple replication levels and the deepest granularity of the replicated object. For this new storage model, you can easily add new disks to nodes or add rack of nodes to a system without any downtime during the maintenance. Rebalancing, migration, new replication and so on can be just programmed because this storage already a program.


Nvidia Demos a Car Computer Trained with “Deep Learning”
The computer uses Nvidia’s new graphics microprocessor, the Tegra X1. It is capable of processing information from up to 12 cameras simultaneously, and it comes with software designed to assist with safety or autonomous driving systems. Most impressive, it includes a system trained to recognize different objects using a powerful technique known as deep learning (see “10 Breakthrough Technologies 2013: Deep Learning”). The computer is also designed to generate realistic 3-D maps and other graphics for dashboard displays. “It’s pretty cool to bring this level of powerful computation into cars,” said John Leonard, a professor of mechanical engineering at MIT, who works on autonomous-car technology.



Quote for the day:

"The most important quality in a leader is that of being acknowledged as such." -- Andre Maurois

January 06, 2015

Flexibility in the Cloud: Customer-Defined Computing
What we wanted to do was give something that was analogous to the idea of a virtual data center. Customers could come, benefit from public cloud and its benefits, such as elasticity, the ability to manage equipment in all different geographies of the world from your own location, transparency of cost, those kind of things. But at the same time, keep the things that you like about your private environment: being able to control it, configure it and do so very accurately. That was the genesis of the idea and vision behind CloudSigma. It was to bring this sort of virtual data center approach to the public cloud.


Software-Defined Storage: What's Fact or Fallacy?
The problem is that SANs have traditionally been tightly bound to their own hardware: redundant controllers, shelves of drives and whatever features (such as replication or deduplication) the vendor could pack in. Upgrades can be expensive — or impossible — and when new capabilities are needed, the options to add them might not be available at all. With SDS, storage vendors offer an additional management layer on top of the storage architecture, which provides a set of upgradeable services and makes use of whatever SANs are available, not necessarily ones that run on the same platform or are made by the same manufacturer.


Samsung at CES 2015: Internet-of-Things is not science fiction, but 'science fact'
"It's not science fiction anymore. It's science fact," Yoon insisted. Yoon theorized consumer devices now have what it takes to make science fiction dreams real through the marriage of sensors and wireless connectivity, but also one more important ingredient: purpose. Part of the common rhetoric uttered at CES and even before the show by other Silicon Valley leaders have stressed that connected devices are really about people and solving problems. "We have to show consumers what's in it for them and what IoT can achieve," Yoon asserted, continuing that IoT also has the potential to "transform our economy, society, and how we live our lives."


BitYota Introduces Breakthrough Data Warehouse Technology
Availability of compute and storage groups manageable by end users. Building on BitYota’s unique capability to separate and elastically grow/shrink compute and storage nodes within a cluster, this feature collects BitYota instances running on these nodes into discrete storage or compute groups that can be assigned to individual users or business roles. This eliminates resource contention between long and short running jobs and enables better allocation of resources to improve performance and ability to meet service-level agreements (SLAs).


Is Agile Harder for Agencies?
Successful relationships require trust and honesty, and we shouldn’t be afraid of discussing this aspect of project management. If you do move away from a fixed scope of work, then the other two items (costs and timings) can be fixed – more or less. If you can get your clients to buy into this from a standing start then you are doing well. In fact you probably deserve a promotion. For most of us this is a continual discussion. Anyway, as soon as you’ve made headway on the argument that it makes little or no sense to try and fix the scope of a digital project, you usually run into a related concern, which we’ll look at next.


Benefits of Continuous Integration
This tip is not intended to go into any details about a particular CI tool or technology or to give instructions on setting up and configuring a CI server, but is instead intended to rationalise why a development team should consider spending the time and effort of implementing CI. After all, there is no such thing as a free lunch, and it takes time and effort to introduce CI. You need to select an appropriate tool that fits your existing technology ecosystem, and then you need to set up and configure it for use within your current development environment. All of this takes time and effort that could be utilized elsewhere.


CIO interview: Federico Florez Gutierrez, Ferrovial
Gutierrez says the CIO has to wear multiple hats today as technology changes promise businesses more than just operational efficiency. “I have three roles: as the CIO, I am in charge of IT for the company; as Innovation Officer I coordinate the business innovation function applying our open innovation methodology, and as chairman of the Purchasing Committee I lead the purchasing function for common families within the group,” he says. Gutierrez thinks IT is complex at Ferrovial owing to the variety of businesses in the group. For example, the IT team has to manage local applications and vertical applications and it centrally manages the communications, IT purchasing and IT security, for the entire group.


2015 is make or break for Microsoft
The problem child for Microsoft is mobile. Windows Phone was released in late November 2010, and more than four years later, after billions of dollars spent, including the purchase of Nokia’s phone and tablet business for more than $7 billion, Windows Phone will have only a 2.7% worldwide market share by the end of 2014, according to IDC. And that share is heading in the wrong direction, being down from a 3.3% worldwide market share in 2013. Windows tablets have fared only slightly better, with an expected 4.6% market share by year’s end.


Thick data closes the gaps in big data analytics
"Individual interaction rules can be interpreted in a deterministic way only up to a certain extent, due to the ultimate unpredictability of human reactions. It is the so-called bounded rationality, which makes two individuals react possibly not the same, even if they face the same conditions. In opinion formation problems this issue is of paramount importance, for the volatility of human behaviors can play a major role in causing extreme events with massive impact...." This is exactly the problem confronting many big data and analytics efforts as they probe into the dynamic of customer behaviors and develop predictability models for when particular customers are most likely to purchase, and what they are most likely to purchase.


Ronica Roth on Vision, Visibility and Business Agility
when you start getting into that alignment and that cadence and getting all of those teams doing mid-range planning together, then now you are beginning to look at something that looks a little like the Scaled Agile framework or some form of it; it doesn’t have to, but the pictures I have in my slides, the pictures that I’ve had for a long time and I look at the big picture of SAFe, ... but be performant and the things that getting the way of that I think are, so we could blow up our silos to do some pilot teams but are we really ready to blow up our silos for a hundred people, are we really ready to break out of a project mentality where we are assigning resources to projects and instead get into a product mentality where we were flowing work through teams



Quote for the day:

“Rank does not confer privilege or give power. It imposes responsibility.” -- Peter F. Drucker

January 05, 2015

Are PC Hard Drives Destined to Die at the Hand of the Cloud? Maybe, Analysts Say
Enterprises don’t like content stored on local devices because of the risk that it could leak outside company walls, and the costs associated with redundant storage placed right next to the worker. Connectivity problems, such as limited Wi-Fi at hotels and other locations, is fading away. And every time a company has bet on local services, such as Apple’s determination to sell MP3s rather than stream music, that company has lost. “The most disruptive technology in the market right now is Chromebooks,” Enderle said. The bottom line? There’s no easy answer to the question of whether local hard drives or SSDs are doomed.


10 things you should do to manage BYOA
BYOD and BYOA are both part of the greater movement of the consumerization of IT. People are used to consumer tools "just working," and that is part of the appeal of the BYOA movement. Many of the apps people bring into the workplace are designed to operate simply, much like their consumer counterparts. This can create problems for IT leaders, especially, as it changes expectations for other corporate software as well. You can manage the expectations by engaging employees and helping them understand the differences in the applications they are bringing in and the software your company relies on to run its core business processes.


D-Link shows off radical 802.11ac routers and Wi-Fi adapters at CES
The flagship DIR-895L/R is based on Broadcom’s BCM47094 chipset and can operate two independent networks on the 5GHz frequency band (with theoretical TCP throughput to 802.11ac clients of 2165Mbps on each), and a third network on the 2.4GHz band with theoretical TCP throughput of 1000Mbps. It will be outfitted with eight high-power antennas, and it supports MU-MIMO (multiple users-multiple input/multiple output) technology so that it can stream high-definition video and audio to multiple clients. The DIR-890L, equipped with six antennas, can also operate two independent 5GHz networks,


Hands-on with Makulu Linux Xfce 7.0: The most beautiful Linux distro I have ever seen
As has been the case in previous Makulu releases, this version includes the WPS Office Suite (aka Kingsoft Office). I don't want to get into a long discussion of the pros and cons of this choice, I will simply say that if you aren't happy with WPS, or you absolutely must have LibreOffice for whatever reason, all you have to do is go to the Software Center (or Synaptic, they are both installed) and install LibreOffice. I just did that, it took less than five minutes to download and install, LibreOffice was automatically added to the Office group in the Whisker menus, and of course is listed in synapse searches.


An example of preparatory refactoring
There are various ways in which refactoring can fit into our programming workflow. One useful notion is that of Preparatory Refactoring. This is where I'm adding a new feature, and I see that the existing code is not structured in such a way that makes adding the feature easy. So first I refactor the code into the structure that makes it easy to add the feature, or as Kent Beck pithily put it "make the change easy, then make the easy change". In a recent Ruby Rogues podcast, Jessica Kerr gave a lovely metaphor for preparatory refactoring.


Held for ransom by the digital ‘mob’
Consumer ransomware is, “a business model that’s going to scale, especially as we get control over more traditional cybercrime business models,” Dai Zovi said. “They’re (cyber criminals) basically entrepreneurs, and they’re going to shift when a new market gives them better returns than an existing market, or their existing market goes away.” Another reason is that, as has been clear for some time, just because a device is “smart,” does not mean it is secure. And embedded devices in the Internet of Things (IoT) are notoriously insecure.


Why doctors are excited about mobile blood pressure monitoring
There are a few reasons. For one, there is quite simply more data being gathered when a cuff worn around one’s arm checks blood pressure at regular intervals throughout a day. But this kind of mobile monitoring also helps catch two types of people who are easily misdiagnosed – those with “white coat” syndrome, who get nervous in doctor’s offices and experience artificially high blood pressure at precisely the time of monitoring (a condition that may affect as many as 30 percent of people thought to be hypertensive), and those who react oppositely, with lower readings either because they take their meds before going to the doctor’s or because they experience more stress in their home environment.


CIOs Need to Snap Out of Complacency
CIOs are spending more time overseeing the nitty-gritty of digital transformation work, such as implementing new systems and re­designing business processes, according to our survey. In some cases, that means a diminished role in big-picture strategic activities such as identifying new commercial opportunities. Specifically, 27 percent of our CIO respondents can be classified as business strategists this year, down from 34 percent last year. And 36 percent of CIOs admit they are fighting turf battles against others in the C-suite--a kind of tumult that can arise in times of big change.


White House plans to leave IT in better shape than it found it
Obama complained about the state of government IT almost as soon as he took office, when he was deprived of the use of his BlackBerry. In 2011, he called government IT operations across all agencies "horrible," and that was two years before the Healthcare.gov debacle. One issue faced by government IT is perception. When compared to the private sector, government IT is seen as a step or two behind in technology adoption. It's a fair assessment, Johnson said, "and I think we should be OK with that." The White House operates in a fishbowl, and any IT issues it faces may have a broader impact. Johnson prefers to have the private sector be the early adopter, with users figuring out new technologies, learning from their mistakes and then partnering with government.


Sony hack could be game changer
Despite passing a flurry of small-bore bills in late 2014, Congress has not moved major cybersecurity legislation in years. And the issues raised by the Sony incident — cyber relations with China, United Nations guidelines for how countries handle cyber issues — are not necessarily areas where Congress wields a heavy hand. “I’m not sure there’s such a direct output for Congress on the international side of things,” said Kristen Eichensehr, an international security professor at the University of California, Los Angeles, School of Law and former State Department attorney.



Quote for the day:

"Character is like a tree and reputation like a shadow. The shadow is what we think of it; the tree is the real thing." -- Abraham Lincoln