January 31, 2015

Data preparation is the unsung hero of big data analytics
When it comes to analytics, there's an old axiom that goes "garbage in, garbage out," meaning that if you throw high volumes of poorly formed data into an analytic solution, you'll get bad results. Historically, the cleansing and preparation of data has been a long, arduous, time-consuming process. When I was at Yankee Group, we migrated CRM systems, but before we could do the migration, the company spent a year doing nothing but cleaning up the records in the existing system so we didn't import bad data. Even with all the work we did, we still had a bunch of bad information that was migrated over.


China Further Tightens Grip on the Internet
The move to disable some of the most widely used V.P.N.s has provoked a torrent of outrage among video artists, entrepreneurs and professors who complain that in its quest for so-called cybersovereignty ... “I need to stay tuned into the rest of the world,” said Henry Yang, 25, the international news editor of a state-owned media company who uses Facebook to follow American broadcasters. “I feel like we’re like frogs being slowly boiled in a pot.” Multinational companies are also alarmed by the growing online constraints. Especially worrisome, they say, are new regulations that would force foreign technology and telecom companies to give the government “back doors” to their hardware and software and require them to store data within China.


Google defends policy that leaves most Android devices unpatched
According to Beardsley, the Android security response team first replied to bug reports in mid-October with the "we-don't-patch-WebView-anymore" message. Beardsley used his blog to urge Google to change its collective mind and return to patching WebView in those older editions, which by Google's own admission power more than 60% of all Android devices. ... "We provide patches for the current branch of Android in the Android Open Source Project (AOSP) and directly provide Android partners with patches for at least the last two major versions of the operating system."


The Technology Coming in 2015: a Realistic Analysis
Every year more and more watch innovations are presented, but they are still seen as products just for geeks. Why might 2015 be different? First, the French company Withings has introduced an innovation that doesn’t seem like one. From the outside it is a conventional watch, while on the inside it carries sensors that monitor activity, sports and sleep. It keeps the correct time by itself, automatically communicates with your smartphone and, like a typical watch, you don’t have to recharge it, though it will require a batter change every 8 months. This new smartwatch proposal, based on simplicity and elegance, won over the tech enthusiasts at CES 2015 and goes on sale in late January at affordable prices.


Use a SQL interface to handle JSON data in DB2 11
This tutorial focuses on a SQL interface recently introduced in DB2® 11 for z/OS® that allows extraction and retrieval of JSON data from BSON objects and conversion from JSON to BSON. With this new feature, users can manage JSON data without relying on DB2 NoSQL JSON APIs. Instead, SQL interfaces can be used for JSON manipulation. Learn about the setup/configuration and get illustrations for common JSON usage inside DB2 11 for z/OS. Hints and tips are provided to improve performance and prevent potential pitfalls.


Storage Spaces Physical Disk Validation Script
As part of a new Storage Spaces deployment, there are a number of functional requirements which each Physical Disk must satisfy before creating a Storage Pool. Further, there exists a natural functional and performance variance between physical disks of the same model (and even manufacturing lot) which can result from a number of factors including manufacturing tolerances, shipping damage, or even vibration in a disk enclosure. In a large storage deployment, these variances can be difficult to identify as the cause of a functional or performance issue.


It's Ben Armstrong and what's new in Hyper-V
In Edge Show episode 134, Rick is getting back in touch with on-premises technologies that are still very close to his heart. This episode has Rick reaching out to Ben Armstrong from the Hyper-V team to talk about all things new in Hyper-V found in the Technical Preview 1 of Windows Server. Ben outlines 2 or 3 big things and a bunch of "popcorn".


The Purpose of Silicon Valley
Such combinations of improvements in hardware and software lead to many technologies that are extremely valuable even if they get less attention than Web or mobile-app startups valued at hundreds of millions of dollars, says Tom Hayes, a marketing executive who founded the Techmanity conference and Joint Venture Silicon Valley, a group that promotes regional development. What confuses outsiders is that so much in the Valley “seems trivial, small ball,” Hayes says, “when the myth is that we are supposed to be out changing the world. In fact, our utopian idealism has shrunk in recent years as we’ve come to realize that even little innovations, in the right context, can have enormous impact … and the odds of pulling them off successfully are infinitely greater.”


Update on the DATA Act
While a strong majority of government organizations reported formal processes around data governance, planning, change management, and almost a majority had a formal organizational structure, fewer reported strong data architectures and only one-quarter reporting measuring the outcomes of their data processes. Most worrisome is the inability to hire, train, grow and retain the data talent they need – only 26% said they did. For some, implementing the DATA Act will certainly be a challenge. However, the generous timeline and the resources available to guide the process will help.


5 reasons why ecommerce is good for the Indian economy
As ecommerce undoubtedly depends on cutting edge technology, it in turn requires a quality workforce. There is a strong demand for web developers, software coders, analytics experts, content writers, graphic designers and digital marketers among other specialized tech areas. On the business side, there is a massive requirement for product and UI interface designers, marketing, ERP & SCM professionals and customer facing staff. All of this adds up to a humungous demand for over 150,000 professionals in the coming years.



Quote for the day:

"Never forget that only dead fish swim with the stream." -- Malcolm Muggeridge

January 29, 2015

Spring 4 and Java 8
It is important to note that Spring is frequently used with other libraries such as Hibernate for data persistence and Jackson for converting Java objects to / from JSON. While Spring 4 supports the Java 8 date and time libraries, that does not mean that third party frameworks like Hibernate and Jackson are able to support the Java 8 date and time. At the time of publication Hibernate JIRA contains an open ticket HHH-8844 requesting support for Java 8 date and time APIs in Hibernate. . ... Finally, compiling Java 8 code with –parameters option preserves argument names in methods and makes it possible to write more compact Spring MVC method handlers and Spring Data query methods.


Professional Training Trends: A Q&A with Chris Armstrong, Armstrong Process Group
If we move a bit further along the EA value chain to what we call “Decide and Respond,” that’s a really good place for a different class of tools. Even though there are modeling tool vendors that try to do it, we need a second class of tools for EA Lifecycle Management (EALM), which is really getting into the understanding of “architecture-in-motion”. Once architecture content has been described as the current and future state, the real $64,000 question is how do we get there? How do we build a roadmap? How do we distribute the requirements of that roadmap across multiple projects and tie that to the strategic business decisions and critical assets over time? Then there’s how do I operate all of this stuff once I build it?


Five innovations that are key to the future of data centers
If people are the heart of an organization, then the data center could be considered its brain, and maybe even its mouth. Quality storage and handling are key to an organization's success. The technologies and processes that power our data centers have grown at an exponential rate. What was once considered state of the art is now considered a relic, and the IT skills needed to manage these new data centers are changing as well. As we move further in 2015, it's important to take a look at some of the hotly debated trends and technologies and see how they might affect your organization in the future. Here are five innovations that will impact the future of the data center.


Avoid disruption through exploration
Where did these once iconic companies go wrong? To my mind, they forgot to keep challenging their assumptions about what business they were actually in. Businesses have two options when they plan for the road ahead: they can put all their eggs into one basket, and risk losing everything if that basket has a hole in the bottom, or they can make a number of small bets, accepting that some will fail while others succeed. Taking the latter approach, and making many small bets on innovation, transforms the boardroom into a roulette table. Unlike a punter in a casino, however, businesses cannot afford to stop making bets.


Analytics: A Gap in the Market or a Market in the Gap?
There are plenty of old-schoolers, such as myself, who were de facto data scientists as a function of training and experience in the natural, social, and behavioral sciences. However the difference is that our data collection efforts were fairly straight-forward (albeit tedious, labor intensive, and time consuming). The labor market demand now is for persons who have natural investigatory curiosity, the ability to sift through numbers, text, and images, and to be comfortable with a range of analytic tools. While there is a consensus that there is a gap in the data scientist market, the contrasting question is whether there is a market in the gap?


How CIOs Can Win In The Cloud
When I asked O'Neill about why he was an early cloud adopter, he prefaced his answer by observing that the goal was to "build a great product, not spend time on the plumbing." This is a great point, and it's worth asking yourself: Would you rather be an architect or a plumber? For Hubspot, the cloud became an enabler of this goal. O'Neill's approach was to let the business drive software selection, not IT. It became clear during rollout, he said, that "they're going to know the business better than us." Pantheon took the "no server at the office" approach. The company's priority was to take the "path of least resistance" and to outsource its cloud infrastructure services to focus on developing a superior product with a quality user experience.


Out of control AI will not kill us, believes Microsoft Research chief
"You might be told, for example, in using this service you have a one in 10,000 chance of having a query ever looked at... each person only has to worry about as much as they worry about being hit by a bolt of lightning, it's so rare. "So, I believe that machine learning, reasoning and AI more generally will be central in providing great tools for ensuring the privacy of folks at the same time as allowing services to acquire data anonymously or with only low probabilities of risk to any particular person."


GIF all the things: Imgur unveils video-to-GIF converter
The new conversion tool is a remarkably simple way to run videos into GIFs: Users just have to paste a video’s URL into a form field, select a segment of up to 15 seconds, add an optional caption and then let the Imgur servers do their work. As always with Imgur, users don’t have to register, and the result can be freely shared across the web and social networks. That no-frills approach has helped to turn Imgur into one of the most popular image-hosting destinations on the web. Product and growth director Sam Gerstenzang told me that the site now generates more than 5 billion page views from over 150 million unique users a month. Initially, most of that activity came from Reddit, where Imgur quickly became the most popular image-hosting resource after launching six years ago.


6 digital health trends to watch in 2015
The industry grew more in 2014 than it ever has before, and that trend will continue into 2015 as there are more innovations in wearables, digital health clinics, telemedicine, and disease research and prevention. The healthcare industry will see a 21% increase in IT jobs by 2020, according to University of Chicago research. Rock Health, a digital health seed fund, recently released a report that showed there was $4.1 billion in funding for digital health startups in 2014. Major tech companies like Apple and Google announced health initiatives last year. And according to ABI Research, activity trackers outnumbered smartwatches 4 to 1 in 2014.


Sector Roadmap: Hadoop/Data Warehouse Interoperability
This Sector RoadmapTM examines that integration, reviewing SQL-on-Hadoop solutions on offer from the three major Hadoop vendors: Cloudera, Hortonworks, and MapR; incumbent data warehouse vendor Teradata; relational-database juggernaut Oracle; and Hadoop/data warehouse hybrid vendor Pivotal. With this analysis, key usage scenarios made possible by these solutions are identified, as are the architectural distinctions between them. Vendor solutions are evaluated over six Disruption Vectors: schema flexibility, data engine interoperability, pricing model, enterprise manageability, workload role optimization, and query engine maturity.


Shedding Some Light on Shadow IT Management
Shadow IT has been lurking in the dark corners of organizations for years now, but as BYOD and public cloud computing gain traction in the workplace more and more employees are stealthily adopting their own software and hardware without telling IT. When IT is left in the dark it makes it nearly impossible to mitigate potential risks, and in light of the recent barrage of data breachesexecutives are becoming increasingly concerned about the issue. So what can you do? First and foremost, accept that shadow IT is here to stay. IDC found that the majority of information workers share files via email and other unsecure methods while only a small group, about 10 percent, use a service provided by their company.



Quote for the day:

“It always seems impossible until it's done.” -- Nelson Mandela

January 28, 2015

Big Data: 5 Top Companies and Their Plans for 2015
Expect new product and service announcements from the established big names, as well as a flood of innovative start-ups hitting the headlines over the next 12 months. This is the first part of my run-through of big data companies I expect to hear great things in 2015. I’ve started with the “big data giants” – established names which have made data the foundation of their business model. In another post I will focus on the newcomers and start-ups snapping at their heels.


Cloud ERP: 9 Emerging Options
The good news for CIOs and their teams considering moving some or all ERP functions online: Vendors have been prepping for this shift, and there's already plenty of choice. The conventional ERP heavyweights -- Microsoft, Oracle, and SAP -- are also in on the trend. You may have noticed how much all three, each in their own way, talked up cloud across the board in 2014. Oracle in particular spent a good bit of time discussing -- at the highest executive levels -- its cloud endeavors and future plans, sure signs that the entrenched on-premises approaches to ERP are getting a cloud makeover, even if such shifts will take much more time than, say, getting off that old Exchange server for email.


World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks
Increasingly, the culprit is Network Time Protocol (NTP), an important but otherwise totally ignored way for the Internet to keep its routers and server infrastructure synchronised with UTC. Not long after an infamous attack on Spamhaus in early 2013, which used something called DNS amplification to summon up potentially vast amounts of traffic, someone worked out that other protocols were open to the same trick. NTP turned out to be a good candidate for the same spoofing/amplification treatment, notably during the almost-as-infamous attack on CloudFlare a year ago, the one Arbor mentions as hitting 325Gbps.


Samsung's $100 million Internet of Things Bet
Samsung has thrown its weight behind an effort called Thread, which also has the backing of Nest, processor designer ARM, and a few other industry players. As Parks Associates analyst Tom Kerber explains, Thread works by assigning every device its own IP address, and brings numerous benefits including end-to-end encryption and low power consumption. "If you think about longer-term, it's very likely that a lot of the intelligence is going to be in the end devices rather than in a central controller, so these end devices need to be addressable, and IP is kind of predominant," Kerber says.


7 Corporate blogging blunders to avoid
Yes, blogging has some huge advantages. And yes, I believe that many companies would greatly benefit from an ongoing blogging initiative. But that means taking the time to do it right.
Blogging requires a strong strategy, good optimization and fantastic content. Without those three elements, your blog will fizzle out before it starts to sizzle. It won’t help you boost search positions. It won’t engage your readers. And it won’t help your company make money. That’s never good. Want to keep your blog on the straight and narrow?


Microsoft unveils a great distraction
Can we all please calm down and look at this product glimpse rationally? Sure, HoloLens will find a home in some markets. I can certainly see design verticals such as CAD and CAM embracing the technology. And I’m sure that gamers will love it. Halo in 3D? I’m there! But outside of those niche markets, does this new headlining feature really offer anything to the ordinary home or corporate user? I don’t think so. My word processor and spreadsheet won’t work any better for being in 3D. As a writer, I want people to become immersed in my prose, but I don’t want to rely on a 3D trick to accomplish that.


Crooks Start Encrypting Websites And Demanding Thousands Of Dollars From Businesses
“The next step might well be the modern equivalent of protection rackets – threatening companies with being either taken offline or having their databases frozen unless they pay a regular fee.” Brian Honan, security consultant, said the modus operandi of the RansomWeb hackers was similar to ransomware attacks against a number of SMBs he had worked with, whereby the criminals broke into the server of the victim, overwrote backups with either the encrypted data or blank data, and at a later date returned to encrypt the server. “At this stage the backups are no longer useful as they contain no workable data to restore the systems, thus leaving the victim companies with the choice of either losing all their data and rebuilding it from scratch, or paying the ransom.”


Data scientists: How to hire and how to get the best from them
Hand says the rise of the data scientist is unsurprising, especially as it has been long predicted that the industry would see a massive shortage of people with a high level of analytical skills. He says any individual with data science in their LinkedIn profile can expect to be bombarded with emails from recruiters - yet, Hand says smart organisations also focus on two other sources of data scientists. "The first is to develop a close working relationship with a university, and not just the computer science school as many of the most successful analysts are coming from other schools of science," he says. "The second is to look inside the organisation for core analytical skills and to be prepared to retrain those people in advanced data analytics."


Building Massively-Scalable Distributed Systems using Go and Mesos
Apache Mesos uses an idiom known as a framework to delegate task scheduling to client code running on the cluster. Spark, for example, was originally a Mesos framework written to the Mesos API using the Scala language bindings. The original version of Mesos was built in 2009, before Go was popular. Today, Go is one of the most popular languages and many of the key components that integrate with Mesos are written in Go. For example, Kubernetes-Mesos, the Mesos framework for running Kubernetes workloads on Mesos is written in Go. Also, Go is popular with the many infrastructure tools including and surrounding the Docker container format which is natively supported by Mesos.


eBook: How to Adopt Microservices
Microservices architecture is emerging as the new standard for building applications. This approach to software design breaks complex applications into small, nimble, independent components to speed up time to market, simplify maintenance, and enable continuous integration.Learn in this new ebook how to adopt this new approach and optimize your applications and development processes.



Quote for the day:

"Leadership is the art of getting someone else to do something you want done because he wants to do it." -- Dwight D. Eisenhower

January 27, 2015

Healthcare’s High-Tech Transformation Includes Bionics, Big Data, and 3D Printing
One of the definitive gamechangers in personal technology was the introduction of the smartphone, which has transformed how, where, and when we interact with technology. And because smartphones are basically tiny computers with an internet connection, putting them to work for our personal health through apps, add-on devices, and cloud storage is now easier than ever before. Whether it’s monitoring your heart rate, counting the number of steps you took today, mapping your walking/biking/running route, or using an app to find the nearest doctor or clinic, more and more people are using the mobility and accessibility of their everyday gadget to improve their health.


Cisco Unveils Analytics Strategy Leveraging Network Intelligence
More specifically, The Cisco Connected Analytics for the Internet of Everything portfolio includes components for network, location, collaboration, contact centers, and video. It is designed to help organizations apply analytics and extract useful insights from data that was mostly created within the organization’s four walls, and almost always resided in a centralized data store. The IoT space is filled with an industry-wide arms race to release the latest and greatest Internet-connected device. Recently, Intel has unveiled a new platform to make it easier for companies to create internet-connected smart products using its chips.


Hybrid Cloud: You Don’t Have to Go All In
The cloud is still something that small to medium size business owners are grappling to fully understand. It’s hard to define exactly how the cloud can help your business when there are so many different variations of cloud solutions available. Understanding exactly what the cloud looks like for any business isn’t easy, because, quite honestly, the cloud looks completely different for every business. As executives try to dissect the different services available and choose options that work for their needs, it’s important to understand – you don’t have to go all in.


Gamification for Business – Recruitment, Management and Promotion
In the gaming context, workers will know that their accomplishments will be justly recognized through various tangible game props and this awareness proves to be a great incentive for action. The clarity of the process helps a lot as well – set goals are clear to everyone and tracking the progress is easier than ever. This is especially relevant to the generation of Millenials that have been brought up playing interactive games and are eager to extrapolate the logic of games onto other areas of life. The regained focus on the aims defined in the game also considerably motivates employees to reach them faster. Since the primary goal of gamification is to recognize one's competence, talented workers will be even more determined to complete the project.


With Multi-Vector Attacks, Quality Threat Intelligence Matters
Multi-vector attacks take advantage of these common vulnerabilities: combining elements like social engineering and ‘spear phishing’ e-mail messages with malicious attachments that contains code that exploits known or unknown (zero-day) vulnerabilities on the target system. While these attacks might rely on commodity malware, they are often tailored to bypass most antivirus engines. As an example, Cisco recently analyzed a multi-vector attack that we’ve labeled the “String of Paerls” (sp) attack that serves as a useful example for the kinds of techniques typical of multi-vector cyber attacks.


SmartDataCenter APIs – turning up the Heat
Following a service oriented architecture, SDC divides the responsibilities for various resources in compact, easy-to-understand API-components. Most of the APIs have a somewhat speaking name. In the table below you find an overview of the core APIs, what they cover and the equivalent project in OpenStack. ... The DataCenter object manages the discovery of the required APIs using the service API (sapi), handles the HTTP requests and provides list_*, get_* and create_*functions. Returned machines (both SmartMachines and KVM) provide functions to control their lifecycle:


Speak Like a Data Center Geek: Networks
It’s literally true that we can’t get enough of networks at Equinix. We were founded as a neutral place where network service providers could come together and exchange data traffic, and today we host more than 1,000 networks, with room for more. That all makes networks a solid choice to headline the 10th installment of our “How to Speak Like a Data Center Geek” series, which aims to bring clarity to the sometimes opaque terms we data center types toss around.


Extending the Reach of Mobile and Cloud in the Enterprise
Another enhancement is closer integration with MDM/MAM (Mobile Device Manager/Mobile Application Manager) like MobileIron. In an earlier post I talked about the work that has already been done with HCPA to add mobility management features on top of our enterprise cloud content management platform HCP. HCPA already brings elements of mobile device (MDM) and mobile information management (MIM) and alluded to the fact that HCPA does not really control which apps can use data but does allow users to better manage which users or 3rd parties can access files and participate in shared folders.


6 DNS services protect against malware and other unwanted content
There are actually two main types of DNS servers: recursive and authoritative. The ones that are used by most individuals and small companies (and that are covered here) are called recursive DNS and are the default services provided by most Internet Service Providers (ISPs). All the companies listed here offer recursive DNS services. Some of them, however, also sell authoritative DNS services, which allow website owners or hosts to define the Web server IP addresses that their domain names point to and to manage other DNS settings. Since DNS servers are the middlemen between your browser and website content, there are many third-party DNS services that offer additional functionality for both users and network administrators.


The Agile Value Delivery Process, Where ‘Done’ Means Real Value Delivered; Not Code
Current agile practices are far too narrowly focused on delivering code to users and customers. There is no systems-wide view of other stakeholders, of databases, and anything else except the code. Agile, today, has no clear management of thequalities of the system, such as security, usability and maintainability: there is a narrow ‘bug’ focus, as the only ‘quality’. ... So, your technical and organizational architecture must permit low-cost changes of new and better, unforeseen architecture. This means new suppliers, partners, and technical components. You will, face it, have to deal with this problem in the long term, hint: ‘technical debt’, so you might as well make sure you can change things easily in the short term.



Quote for the day:

“Live as if you were to die tomorrow. Learn as if you were to live forever.” -- Mahatma Gandhi

January 25, 2015

The Internet of Robotic Things: Secure, harmless helpers or vulnerable, vicious foes?
“As IoT matures, we see the industry adding more robotic and AI functions to traditional industrial and consumer robots,” says Cooper. Beyond simply automation, these functions include predictive analysis, learning capabilities [such as machine learning], autonomous decision making, and complex programmable responses, explains Cooper. “The autonomous nature of these systems and their often critical function in the larger system make them of particular concern when it comes to security,” says Cooper.


How Xerox Jumpstarts Transformation through "Dreaming Sessions"
The process starts several weeks before the client shows up at the lab. We normally work with decision makers from multiple disciplines within the company. Well in advance, we need to understand their businesses, their workflows, what kinds of problems are they struggling with today. And then in the dreaming session itself, the client talks about their business, where they'd like to go, what they've envisioned. And then researchers will share some technologies we are working on in the labs. Maybe we share things we can do with data analytics or how to truly personalize a service. And then we show them possibilities for the future based on trends that we have expertise in.


Scrum explained
Although hard to execute, Scrum has some advantages that make its usage really worth. It embraces change: this is something which is one of the biggest problems in waterfall processes. Whenever anything needs to be changed, a long analysis had to be made, documents modified, for at last, modifying the product itself. Moreover, change is not welcomed in these processes - it is always something to be avoided. Scrum on the the other hand, embraces change, it welcomes it. Scrum recognizes that in software development change in natural, it means that the product is being used.


As Big Data and AI Take Hold, What Will It Take to Be an Effective Executive?
And most important, senior managers must learn to let go, something which is quite difficult because it runs counter to decades of organizational practices. Given our rapidly rising oceans of data, the command-and-control approach to management–where information flows up the organization and decisions are made at high levels–would sink the senior executive teams. As data science and AI permeate the organization, it’s important to delegate more autonomy to the business units that hopefully have the proper skills, the advanced tools and the necessary information to make better decisions on their own.


Five Critical Priorities HR Can’t Afford to Ignore in 2015
How employees get their work done has changed remarkably quickly; unsurprisingly HR needs to change, too Anyone who works in a global company doesn’t need to be told that their job has changed enormously in the past few years. Even if their job title – and sometimes their job description – remains unscathed, the number of people they work with, the amount of information they use to make decisions, their day-to-day tasks, and the technology they use have all changed quicker than at any time in their careers.


Sony's Two Big Mistakes: No Encryption, and No Backup
Vox's Timothy B. Lee points out in his step-by-step account of the Sony data breach that the company's networks were "down for days" following the November 24, 2014, attack.  Any business-continuity plan worth its salt prepares the company to resume network operations within hours or even minutes after a disaster, not days. A key component of your disaster-recovery plan is your recovery time objective. While operating dual data centers is an expensive option, it's also the safest. More practical for most businesses are cloud-based services such as the Morpheus database-as-a-service (DBaaS).


The 3 Little Architects – A Data Parody for today’s Financial Industry
The last architect is as technically competent as his peers however understood the value of building something once to use across the business. His approach was a little different than the first two. Understanding the risks and costs of hand coding or using one off tools to do the work, he decided to adopt an integrated platform designed to handle the complexities, sources, and volumes of data required by the business. The platform also incorporated shared metadata, reusable data transformation rules and mappings, a single source of required master and reference data, and provided agile development capabilities to reduce the cost of implementation and ongoing change management.


Why IT Should be Skeptical of 'Facebook at Work'
Facebook at Work will put the company in the crosshairs of established businesses including Microsoft, IBM, Jive, Zimbra and Slack. "Facebook has been a consumer social media innovator as well as a shrewd assembler of adjacent social media products," Keitt says. "So it stands to reason that as Facebook gets more comfortable in the enterprise space, it may seek to pull in more of these interesting consumer applications into an enterprise offering," similar to how Google rolled its family of apps into Google for Work.


.NET Becomes Open Source and Cross-Platform
This morning, the announcements made at Microsoft’s Connect() event in New York have been rippling through the web and the effects of these announcements are likely going to be felt for years to come. ... For decades, opponents of Microsoft have criticized the company for being too closed off and secretive and as of this morning, they may need to consider researching new arguments. The folks at Redmond absolutely stunned the world this morning with the announcement that the entire .NET ecosystem would be made open source and developed in the open.


Africa: The rise of BYOD & corporate data threats
“The scope of the problem only intensifies as business models continue to evolve with increased mobility, a growing mix of users, and geographically diverse business offices.” “The risk posed by the high percentage of employees with laptops, mobile phones, PDAs, multiple email accounts, and access to applications and databases makes addressing the insider threat a substantial challenge. Reducing the vulnerabilities posed by internal users needs to be a key priority in Kenyan organisations’ security strategies,” the report said. The report continues to suggest that the insider attacks which are deliberate are fuelled by disgruntlement, revenge, competitive advantage and blackmail. Most of the users already have access to the systems and so detection becomes difficult.



Quote for the day:

"When all think alike, then no one is thinking." -- Walter Lippman