July 18, 2015

Services and disservices – 5A: Social example (Introduction)

The Duluth Model – the supposed ‘standard model’ for this context (the contextual equivalent of TOGAF, one might say?) – holds to that perception of DV as a ‘male-only’ evil, asserting that “women and children are vulnerable to violence because of their unequal social, economic, and political status in society” and that “we do not see men’s violence against women as stemming from individual pathology, but rather from a socially reinforced sense of entitlement”. It is explicit in its assertions as to who needs help, and where the cause exclusively resides: ... It also insists that “men are perpetrators who are violent because they have been socialized in a patriarchy that condones male violence, and that women are victims who are violent only in self-defense”.


How The Grid uses AI to revolutionize web design

The Cassowary Constraint Solver is a toolkit that essentially allows web designers to design a webpage with more flexibility. Soon after, Tocchini met Brian Axe who, coincidentally, worked with Badros at Google in the past. The pair founded The Grid, an AI platform that builds and designs websites for users in as little as a few minutes. Badros ended up as an investor in the company. He said that the goal is to make responsive design accessible to everyone, regardless of technical prowess. "They are removing a key technical challenge for the majority of publishers who want to communicate effectively across a wide range of devices without the burden of bad technology," Badros said.


These 9 Cloud Computing Skills Could Give You The Next Career Jump

At the end of last year, there were over 3.9 million jobs in the cloud computing field in America alone—and over 18 million around the world. And professionals with cloud computing experience took home a median salary of over $90,000. It’s a great field to get into — but what skills do you need for a job in cloud computing? Any expertise in these 9 areas will help set you apart from the rest of the application pile. ... While some jobs only require one of these languages, you’ll increase your employability by being familiar with more than one. Yes, familiarize yourself with the many interactive coding lessons available online. Pick one of the languages and start learning!


Robot With Bacteria Brain Stalks Food, Is Your Worst Nightmare

Here's what you have to know: 90% of you, isn't you. You're only 10% human cells. The rest of you is made up of microbes that aren't you, but they are a part of your normal physiology. For instance, you have trillions of microbes in your digestive system that break down your food. While that sounds gross, it is a good relationship. They break down the food and we ingest most of it in the form of nutrients. They take a handling fee in the form of some of the food and live on. Here's the thing: We're starting to realize that not all of those microbes mind their own business. Some of them actually change our personality, control our actions, and might even be the cause of mental disorders.


Hipaa’s Use as Code of Silence Often Misinterprets the Law

Intended to keep personal health information private, the law does not prohibit health care providers from sharing information with family, friends or caregivers unless the patient specifically objects. Even if she is not present or is incapacitated, providers may use “professional judgment” to disclose pertinent information to a relative or friend if it’s “in the best interests of the individual.” Hipaa applies only to health care providers, health insurers, clearinghouses that manage and store health data, and their business associates. Yet when I last wrote about this topic, a California reader commented that she’d heard a minister explain that the names of ailing parishioners could no longer appear in the church bulletin because of Hipaa.


Object storage: why, when, where… and but.

A horizontal platform serving many (secondary) storage needs is what I have been talking about for years now, and I’m glad it is finally happening. API-based Object Storage was the first building block, but now it seems it is going to be integrated in more sophisticated products capable to do what was previously possible with external appliances or software. And this means less complexity and ease of use which, again, will drive more adoption in smaller environments (not only hyper-scale!). This new scenario is not ideal for many of the “traditional” object storage startups around, some of them are very specialized and their file/block protocols are not as good as the core part, while data services are non existent!


Seagate Intros Data Management Services for Hybrid Cloud

Seagate unveiled its Backup and Recovery Private Cloud, a multi-tenant instance of data protection software that IT organizations or cloud service providers can deploy themselves to provide up to two petabytes of storage, and Data Management Services, a service through which Seagate analyzes data usage to advise customers on what tier of storage particular data should reside to store it most cost effectively. Finally, earlier this week, Seagate revealed that it has extended an existing storage alliance with HP and IBM involving its ClustorStor appliances into the realm of high-performance computing.


8 Ways the Internet Of Things (IOT) will change the way you live

The way technology is changing it looks like you no need to worry about anything, your every device will worry about you and will take care of you. The era of Humans control devices is over now, It changed to Devices control humans . Before going further on this article, let us first see why Big companies creating business over IOT, so many Internet of things projects going on in market. Companies are forced to adopt new protocol since Internet of things became popular. ... Your vehicles now are automated, you come near to your vehicle in parking slot, it automatically take reverse and will come just infront of you. They analyse the traffic data collected over the period of time, will change the route by considering google maps data, history and will decide which route to take today.


Using Data to Save Lives  


The program recognizes organizations and individuals implementing analytics in innovative ways to improve the health of their patients and the financial performance of their organizations. The Analytics All-Stars program showcases those who are providing pioneering leadership, spurring innovation and driving improvement across their organizations. ... What's especially frustrating, Showalter says, is that he's always treating patients after their disease has put them in dire straits. In addition, even after the health system treats heart attack victims and educates them on better lifestyle choices and available treatments, 1 percent of all patients leaving the University of Mississippi Medical Center will have a heart attack within a year of discharge.


Introducing Programming Without Coding Technology (PWCT) to C Programmers

It's all about applying the principles of programming on the process of typing code itself. Yes, we are doing it the wrong way for many years, but how can we notice that and prove it at the theoretical and practical side. This article will provide the concept behind visual programming to C programmers, why you shouldn't write C code directly again, why the code must be generated for you, why you should have visual representation for your programs, why you should interact with the visual representation and become able to use visual programming to create your new code without typing that code directly. We are programmers, what are we doing everyday? We are writing code? Sure but, it's not our goal to write code, it's just the method that we use to achieve our goals.



Quote for the day:

"A bad system will beat a good person every time" -- W. Edwards Deming

July 16, 2015

Disaster Preparedness Strategies for Recovery Assurance and Peace of Mind

Obviously, the well-being of your employees in a disaster situation is more important than anything else, and establishing safety protocols and procedures should be your first priority. From there, identify key operational personnel – those people without whom your business can’t operate – and provide them with the ability to work remotely or from a secondary location when a disaster strikes. Determine the steps that will be required to get those employees online and communicating with each other in the event of an outage, and make sure they have quick and easy access to the business-critical data, systems, servers and other infrastructure they need to keep the business running.


Windows 10 -- download full version, before release date

One obvious change that signals this is not a typical beta build is that the Windows Version watermark in the bottom right corner of the screen is now gone. Another point to make is that this build has been released to both the fast and slow rings at the same time.  It's two weeks until launch, and the RTM build...will be shipped to OEMs to use as the basis for them to install on new hardware. ... Up until now every new build has been a full install of Windows overtop of the existing one [but now] it will likely shift to a Windows Update style where just components are updated rather than the entire OS. MORE


Network Services Framework goes live across public sector

Hurrell said that CCS had built on the lessons learnt from both previous frameworks and the extensive consultation process. “We’ve done lots of market engagement and spent a lot of time with suppliers and customers. We got suppliers into working groups to tell us how they would like to sell to government. Some of what they proposed we accomplished, some we didn’t. We tried to arbitrate between what users and suppliers wanted,” she said. “We really made an effort to listen to that feedback – including listening to customers across the public sector so we hope that means they will want to use it because we’ve given them what they asked for.”


Engineering Reverse Innovations

Casting off preconceived solutions before you set down to define problems will help your company avoid the first trap—and spot opportunities outside its existing product portfolio. Consider the problem of irrigating farms in emerging markets. Farmers will argue for the expansion of the power grid so that they can use electricity to run water pumps and irrigate fields. However, farmers need water, not electricity, and the real requirement is getting water to crops—not power to pumps. If they isolate the problem, engineers may find that creating ponds near fields or using solar-powered pumps is more cost-effective and environmentally appropriate than expanding the power grid. When defining problems, executives must keep their eyes and ears open for behavior that may signal needs that customers haven’t articulated.


6 ways to give millennials the mentorship programs they want

Traditionally, mentorship programs have been set up by HR, and younger employees were matched with managers or executives, ... But millennials are disrupting that mentorship model. They want better, faster and more effective mentor programs — or they're ditching HR and doing it on their own. Companies should think of ways to refresh their current programs and engage millennials. ... It can be hard for busy executives to find time for mentoring, but it's important for companies that want to retain millennials to have a few key business leaders involved in mentorships. "Programs don't work unless someone in HR or a senior executive is going to accept the role of champion and is willing to make sure the company invests in the program," Dessau says.


Value sensitive design helps CIOs tackle social, ethical tech issues

There are some researchers who believe you can code a computer to be more ethical than a human -- that a human relies on emotional responses and, under stress, we can make wrong decisions. There are others who argue back that's what it means to be human -- that you make decisions based on your humanness and not necessarily through some cold rationality. I fall into the camp sort of in between [the two], but I lean more toward not coding ethics because we cannot know all external circumstances in the time that we code some device. For example, a killer robot: We cannot possibly code in every single set of conditions that a killer robot might face. And so, unless you can guarantee certainty of outcomes, I am not a fan of coding in ethical decisions.


Chasing Metadata to Improve Decision Quality

Metadata is really about providing the color behind the data that we deal with. It brings context in to life. Metadata augments our engagement with the data by connecting meaning with purpose and goes on to create a new kind of data in the process – the kind that adds the context. Metadata truly embodies the soul of the data, one might add, so that it can come to life and be useful. But as much as metadata defines what data is and how to get the most use out of it, such context also underscores what isn’t in the scope of the data in question. Context, in this manner, provides an invisible boundary – a framework, if you will, to help narrate a story better through the data on hand. Context when coupled with content, even when incomplete, provides the foundation for understanding.


SanDisk Launches Connect Wireless Stick Drive

Flash storage solutions specialist SanDisk has expanded its mobile storage portfolio with a wireless mobile flash drive, the Connect Wireless Stick, up to 128 GB of storage and a compact design. The Connect Wireless Stick works with smartphones, tablets and computers, and allows users to wirelessly access media or transfer large files, save and share photos and videos, or stream HD videos and music to and from mobile devices, up to three at a time. The drive is also capable of supporting a single stream for up to 4.5 hours on a single charge, and with its USB connector, users can also connect directly to a computer to save and transfer files. The SanDisk Connect app enables management of content between devices, all through password-protected WiFi connectivity.


Data Breaches Boost Funding for Cybersecurity Startups

One reason is that cybersecurity startups were often acquired prior to an initial public offering, says Scott Weiss, an Andreessen Horowitz partner. Mr. Weiss sold his own security startup, IronPort Systems Inc., to Cisco Systems Inc. for $830 million in 2007. Well-received offerings from companies including Palo Alto Networks Inc. in 2012 and FireEye Inc. in 2013 have altered that view. Partners at Andreessen Horowitz say they likely wouldn't have invested in a company like Keybase even two years ago. Over the past 13 months, the firm also made an unusually large $142 million bet on Tanium Inc., which tries to make it easier for companies to find vulnerable and infected machines on their networks.


Rise of the Data Visualization Competency Center

Successful data visualization requires using the right kind of graphicacy to correctly interpret and analyze the data, as well as employing the right combination of design principles to curate a meaningful story. However, guarding that visualization process isn’t one I consider to be a question of governance. Ultimately, we need to be able to construct a way to insulate the business from the risk of self-service data visualization with the essence of governed data visualization, but without restricting or otherwise limiting the inherently creative process that drives individual data visualization activities.



Quote for the day:

“Don't blow off another's candle for it won't make yours shine brighter.” -- Jaachynma N.E. Agu

July 15, 2015

Flash Storage Prices Keep Falling: What it Means For the Future

The combination of increased capacity and lower prices have turned SSD into an even more competitive alternative to hard disk drives. When one of the main selling points of HDD is its larger capacity, it’s easy to see why hard disk drives may fall in overall use. At the moment, most hard disk drives are stuck at around 10 TB in capacity. SSD has yet to reach that same level, but it is quickly catching up. Experts are predicting that solid-state drives will eventually match HDD, or at least come close to matching it, sometime in 2015. SSD will likely overtake HDD capacity in 2016, with some experts even estimating that 30 TB solid-state drives will be produced as soon as 2017. At the same time, the price of flash storage will continue to fall.


Google Proposes Open Source Beacons

Google is calling its beacon protocol Eddystone, a name that comes from a lighthouse in England. It's available on GitHub, under the Apache 2.0 license. The software supports Android, iOS, and many BLE devices. It is compliant with the Bluetooth Core Specification. In contrast to iBeacon, it also supports multiple types of data (frame types). So while an iBeacon is limited to broadcasting an identification code, an Eddystone beacon could transmit an identification code, or a URL, or telemetry data about voltage or device temperature. Google is also releasing two APIs: The Nearby API for Android and iOS, which allows developers to create publish and subscribe methods to share messages and connections between nearby devices, and the Proximity Beacon API, to manage data associated with a BLE beacon through a REST interface.


6 things Evernote does that Microsoft OneNote can't

So it’s not surprising that once people pick Evernote or Microsoft OneNote as their repository of choice for digital scraps, doodlings and scanned documents, they usually stick with that choice. Once you have committed to one of these two popular products, it’s not easy to toggle between them or switch entirely. About a year ago, I chose Evernote over OneNote, and I started amassing my own digital archive. At the time, Evernote's Mac software was far superior to OneNote's Mac app. However, Microsoft has continually upgraded OneNote for Mac and iOS, and today it's a legitimate Evernote rival; if I were facing the Mac Evernote versus Mac OneNote decision today, it would be a different situation.


Self-Charging Phones Are on the Way, Finally

One way the consumer electronics industry is trying to fix this is by aligning with wireless charging technologies like Qi and Rezence. So far, though, only a handful of smartphones from companies like LG, Samsung, and, HTC use the Qi standard, while Rezence-supporting handsets are set to come out later this year. With such wireless charging still far from the mainstream (and still requiring your phone to be on a charging mat or base that itself plugs into a wall), a few companies, including Nikola Labs, are trying to figure out other ways to make you less dependent on outlets so you can keep using your phone for battery-intensive things like looking at websites, navigating trips, and streaming videos.


Asking the right questions: unlocking the value buried in all that data

There are a lot of untold stories in our data said Dave Schubmehl, research director for content analytics, recovery and cognitive systems research with International Data Corp. (IDC), who presented the results of research of 2,000 global knowledge workers about what they do to unlock value in their data. He said the state of information access hasn’t dramatically changed over the last decade, despite the big data hype. “There’s a tremendous opportunity to find the information hidden in your company, whether it’s in a content management system or your email servers. If you acquired a company, it may be in another system you don’t know is there,” said Schubmehl.


So About That Whole Tech-Eating-Jobs Thing

All of which would be a good thing–as most jobs are crap jobs–except that our society is not built for a world in which more and more people are unemployed. Not unless we implement something like a basic income. …That’s the argument, at any rate. It’s one I’ve made repeatedly in this space over the last few years. (Echoing many others, to be clear.) But intellectual honesty compels me to admit: the available evidence does not currently support it at all. If the USA is the canary in our global coal mine–which seems likely, given its high technology and liberal labor laws–then the workers of the world have little to worry about any time soon. “Robots Seem to Be Improving Productivity,


How To Survive Digital Transformation

MIT researchers say the invention of the steam engine began the most transformative social development in the last 3000 years. Fast-forward to today’s paradigm shift – the convergence of technologies fueled by innovation accelerators like renewable energy, robotics, cognitive computing, and the Internet of Things. Is your organization prepared to thrive? That’s the question that was discussed in a recent episode of Game Changers radio: The Next Paradigm Shift and Your Digital DNA, hosted by Bonnie D. Graham, and featuring Futurist Thornton May, Frank Diana of TCS Consulting and me, Timo Elliott, SAP Innovation Evangelist.


14 Security Fails That Cost Executives Their Jobs

When you look at the list of companies that have been hacked in some way, it becomes apparent that even the most technically sophisticated organizations can be breached given a sufficiently well-funded, determined attacker. Speaking on 60 Minutes in 2014, FBI Director James Comey put it this way: "There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese, and those who don't know they've been hacked by the Chinese." And Chinese hackers are not the only hackers in the world. Given the vulnerability of IT systems, the first act of an incoming CEO, CIO, or CTO should be to write a resignation letter, apologizing for the "unforeseen" data breach that everyone feared was coming. Ideally, the letter's presence will serve as a reminder to prioritize security concerns.


20 Features of Office 365 That May Surprise You

Office 365 for Business offers the same features (Outlook, Word, Excel, PowerPoint etc) that you maybe familiar with, plus additional tools to help you collaborate and be more productive. What does that mean? In short, Office isn’t now constrained to well, your office! From PC, Tablet to Phone you can access, edit, collaborate and save your files across devices and when on the go. But there’s more…..here are 20 features of Office 365 that may surprise you.....


Check Your Normative Defaults

Once you start thinking about normative defaults in your digital experiences, it’s hard to stop seeing them everywhere. Software is considered more science than art, but highly subjective decisions go into building it. ... Not all defaults are problematic. We want software that makes reasonable assumptions, informed by demographics, user research, and past behavior where obtainable. Maybe one distinction to draw is that the defaults should be less about our core identity (assuming one is male, or an English-speaker), and more about our presumed mindset when using the web service. You may not be sure who a user is, but you may be able to infer why they are there.



Quote for the day:

“The most successful people have the same twenty-four hours in a day that you do.” -- Jay Samit

July 14, 2015

CIOs must embrace consumer cloud tools or risk losing control

Finding the right data and information is still a complex and convoluted proposition for many employees, so they look to external tools for help, according to Vanessa Thompson, research director of enterprise social networks and collaborative technologies, IDC.Thompson says IDC's latest research indicates that inefficient access to data from remote locations is undermining productivity, and she says it's getting worse. For example, Thompson still hears from executives who email their work as attachments to personal accounts because they can't easily share work files or take them home from work. It's not always a bad thing for employees to use multiple collaboration platforms at work, but disparate sets of tools can negatively affect workflow and productivity, and threaten a company's information assets.


An Overview of NFV Elements


The main appeal of using NFV to deploy network elements and virtual network functions (VNFs) is that services can be launched more quickly, by installing software on a standard hardware platform. This is akin to the way software applications could be developed and launched for the PC platform when it first emerged. Another advantage is lower capital expenditures, because standardized hardware platforms tend to drive down costs. The NFV model also adds flexibility, allowing service providers to launch, improve, and incrementally optimize services using software updates rather than wholesale hardware replacement. It will also create an “ecosystem” of third-party software vendors eager to supply improvement.


Why 'Follow Your Passion' Is Awful, Flawed Advice

Passions are magical, but businesses are grounded in realities. Do you remember when Dorothy and the gang peered behind the curtain to find out that the Wizard of Oz wasn’t an all-powerful being, but rather, kind of a loser? Or when you found out that Santa Claus wasn’t real? Or when you figured out that your parents weren’t superheroes, just people with flaws? It sucked, right? Our hobbies are about escapism. There is a bit of magic and fantasy in them. When you make that your business, you are privy to the nuts and bolts. That tempers the magic.


A Biodegradable Computer Chip That Performs Surprisingly Well

In conventional chip manufacturing, electronic components like transistors are made on the surface of a rigid wafer made of a semiconducting material such as silicon. Researchers at the University of Wisconsin, led by Zhenqiang (Jack) Ma, a professor of electrical and computer engineering, made the electronic components in a similar way but then used a rubber stamp to lift them from the wafer and transfer them to a new surface made of nanocellulose. This reduced the amount of semiconducting material used by a factor of up to 5,000, without sacrificing performance. In two recent demonstrations, Ma and his colleagues showed they can use nanocellulose as the support layer for radio frequency circuits that perform comparably to those commonly used in smartphones and tablets. They also showed that these chips can be broken down by a common fungus.


Hacked in the U.S.A.: China’s Not-So-Hidden Infiltration Op

“China is building the Facebook of human intelligence capabilities,” said Adam Meyers, vice president of intelligence for cybersecurity company CrowdStrike Inc. “This appears to be a real maturity in the way they are using cyber to enable broader intelligence goals.” The most serious breach of records occurred at the U.S. Office of Personnel Management, where records for every person given a government background check for the past 15 years may have been compromised. The head of the government personnel office, Katherine Archuleta, resigned Friday as lawmakers demanded to know what went wrong. The campaign began in early 2013 with the travel records, said Laura Galante, manager of threat intelligence for FireEye Inc., a private security company that has been investigating the cyber-attacks.


How cloud governance proves essential in the Bimodal IT era

To a great extent, the advent of social media has also resulted in direct customer feedback on the sentiment from the external customer that businesses need to react to. That is actually changing the timelines. It is requiring IT to be delivered at the pace of business. And the very definition of IT is undergoing a change, where we need to have the right paradigm, the right technology, and the right solution for the right business function and therefore the right application.Since the choices have increased with the new style of IT, the manner in which you pair them up, the solutions with the problems, also has significantly changed. With more choices, come more such pairs on which solution is right for which problem. That's really what has caused the change that we're going through.


Hacking Team's malware uses UEFI rootkit to survive OS reinstalls

UEFI is a replacement for the traditional BIOS (Basic Input/Output System) and is meant to standardize modern computer firmware through a reference specification. But there are multiple companies that develop UEFI firmware, and there can be significant differences between the implementations used by PC manufactures. Hacking Team developed a method for infecting the UEFI firmware developed by Insyde Software, a Taiwanese company that counts Hewlett-Packard, Dell, Lenovo, Acer and Toshiba among its customers, according to security researchers from antivirus vendor Trend Micro. “However, the code can very likely work on AMI BIOS as well,” the Trend Micro researchers said in a blog post. .


How to Beat the Bots

Technology is redefining work and commerce, and if we’re smart it can also redefine education for employment and advancement so everyone can monetize, or improve, any skill and connect with any employer in need of it. “Up to 540 million people could benefit from online talent platforms by 2025,” McKinsey said. It is not that hard. We need to be making much better use of the federal government’s labor market data and that of websites like Monster.com, HireArt.com and LinkedIn, and even consider creating skill equivalents of the Obamacare health exchanges. Online talent platforms — that can link everyone’s C.V. with every job opening, with the skills needed for that job, with the online and campus-based schools offering those skills with data showing which schools do it best — create more employment, more relevant skills and the right education for them.


Changing the World by Spreading the Knowledge of Innovators

According to O'Reilly, no matter the size of the company, as long as organizations have the right core values and mission, they can be having fun and creating value. In his career he has found that many of the most interesting movements actually start, not with entrepreneurs wanting to make money, but with people who just want to make something cool and are having fun doing it. Although the fun stage of companies doesn't always last forever -- when companies get to a certain size the logic of the machine takes over -- the commitment and values driven mentality does. "I think the Google of 10 or 15 years ago was having a lot more fun than the Google of today, even though Larry and Sergey really are deeply committed and values driven," says O'Reilly.


Integrating Raft into JGroups

Raft favors consistency over availability: in terms of the Cap theorem, jgroups-raft is a C-P system, meaning that if it can’t get a majority of nodes agreeing, it won’t be available but it will maintain its consistency. If for example we have a cluster of 5 nodes, 3 is the majority, so it will be possible to read/write on the system even with 2 nodes failures. With more than 2 failures it’s impossible to get a majority so the system won’t be available (though it’s possible to have some read-only features in this case). In summary, at a very high level Raft consists of a leader election, (which requires a majority), as well as nodes being coordinated by the leader, each having one persistent log detailing what they are doing. An excellent graphic explanation of how Raft algorithm works in detail is available here.



Quote for the day:

"By the time they fully evolve, machine learning will have become culturally invisible " McKinsey on Machine Learning

July 13, 2015

An Algorithmic Sense of Humor? Not Yet.

Radev and co say the results provide some insight into the nature of funny captions. “We found that the methods that consistently select funnier captions are negative sentiment, human-centeredness, and lexical centrality,” they say. That’s a curious study that is hard to evaluate. The researchers acknowledge that there is no surprise in finding that negative sentiment correlates with funniness; human-centeredness is also an expected property of humor. The significance of lexical centrality is less clear. And therein lies the problem with this kind of research. It’s easy to imagine that one goal from this kind of work would be to create a machine capable of automatically choosing the best caption from thousands entered into the New Yorker competition each week.


Your Data Center – White or not White-Box Switches

They want the ability to automate and drive operations cost down and transform to cloud economics. They want to scale their architecture in an open multi-vendor environment that can be managed at velocity in a simplified agile manner without any compromise on security or compliance. They want to be able to provision and apply policies across the entire infrastructure without the cumbersome or possible errors that may jeopardize security and business uptime. And as they run physical and virtual workloads, they want an infrastructure that is transparent and enable these workloads to reside anywhere without restrictions on movements. Does whitebox switch model help these customers in that journey? Cisco’s Frank D’Agostino sat down with Forrester Andre Kindness to discuss this topic.


How CIOs can create the voice of IT

"Smart CIOs are aware that just like the cell phone space, their world has become commoditized," says Kristen Lamoreaux, president of Lamoreaux Search LLC, an information technology-focused placement firm. "Every one of their business leaders has options. They no longer have to go to IT for computer services -- they can go to Amazon and order what they want in three clicks. Therefore, IT needs to demonstrate its value … and CIOs are recognizing they need to step up their game in terms of communications." ... "As I start building out the elastic nature of IT, I need someone to help communicate and change the conversation I have with business and put things in business-enablement terms—not technical terms," Bhagat explains.


'Platform revolution' signals the end of industry boundaries

One key implication of the platform revolution is that industry boundaries blur as platforms take over and customers' demands and behaviors continue to evolve. In the platform era, a drug store chain becomes a healthcare provider, as is the case with Walgreens; a phone manufacturer becomes a bank. And most of these platforms seek to deliver "an outcome" for customers rather than a product. Increasingly, customers come to a company for a result -- "I want to improve my health, I want more leisure time, I want more convenience in how I manage my home," Daugherty said, outlining this shift in customer demand. The "outcome economy" doesn't just apply to consumers; the shift is broad and affects the B2B world as well, including Accenture, he said.



Computers Still Beat Mobile for Online Shopping

Reasons for the hesitation to shop on mobile devices could be related to the potential for errors, the study said. "While Amazon offers customers one-click purchasing, thus avoiding the tedium and potential error involved with entering credit card and address information, even this is not a perfect solution for first-time buyers, and is often not available on most other retailer sites," the study's authors wrote. "Until that changes, the computer may remain the device of choice for e-commerce, meaning retailers ought to continue optimizing the large-screen online retail experience for consumers."


IoT analytics brings new levels of innovation to new product development

In order to develop and market new products most effectively, you need to create a "single point of truth," or a body of data and insights that is comprehensive, accurate and timely.  These data and insights will provide all disciplines within the company involved in designing, manufacturing and marketing a new product the information they need to make critical decisions – product features, pricing, distribution and related functions. ... Streetline is a good example of how a company is using what some are calling IoT analytics to build out new products. The company recently launched Streetline IoT Gateway, part of the company’s mission to create smart cities and smart campuses.


How Digital NEST could lift a struggling rural community 

Digital NEST works on two primary levels — the first is providing access to tech, and also providing access to a diverse community. It's modeled after companies like Google and Apple, so there's plenty of food, the furniture is moveable, and it's just a cool place for kids to set up shop. The second level is education. Digital NEST offers short courses they call Institutes that cover everything from how to write a resume, to graphic design, coding, and videography. Basically, any tech skills that could lead to a job, Martinez said. It's impossible to explain the mission of Digital NEST without getting into the much larger, flawed ecosystems of both the tech industry and the plight of a community like Watsonville.



The Mobile Arms Race: Why Privacy Is the Next Battleground

It’s unclear how much privacy — or the perception of it — will matter in the mobile race toward “big data.” The concept of big data involves piecing together information from multiple areas to create new insights. This approach requires the consumer to share more in order to receive more personalized and relevant features. ... Data and the features that can be built around customer information have become the current battleground in the mobile wars because tools like machine learning represent the last frontier in a mature market. “We’ve reached a period of incremental innovation, and Google and Apple are looking for the next big leap,” says Saikat Chaudhuri, an adjunct management professor


How techies can volunteer their skills to help nonprofits

Finding others who want to use their tech skills for good is a great place to start. One possibility is Catchafire, a platform that matches talented people with causes they are passionate about. Basically, you pick a topic you care about, like "black male achievement," "maternal health," or "animals," and then pick what you're good at. It could be "data analysis, "digital marketing," "engineering," "web development," or a range of other fields in technology. Catchafire helps you find a project to work on from there. It may be remote or in person, one-day long or several months long. It shows you how much money you're helping save by donating your technical skills, and you get to practice those skills in the process.


The Most Common Reasons Why Software Projects Fail

Project failure can be defined as one or a combination of cost overruns, late deliveries, poor quality, and/or developing a product that does not get used. Regardless of their involvement during the planning stages, more often than not, software developers bear the brunt of the responsibility for such situations; after all, they’re the ones who built the application. However, closer examinations of the projects do not always show evidence of incompetence. ... Being clear on these definitions ensures projects get off on the right foot with realistic targets and an understanding of the project’s constraints. Not doing so can send a project on a death march from the start due to one of more of the following factors.



Quote for the day:

“The only way to follow your path is to take the lead.” -- Joe Peterson