July 27, 2015

Nonstop Cyber Attacks Drive Israel to Build Hack-Proof Defense

“If I ranked the existential threats, cyber would come right behind nuclear weapons,’ said Carmi Gillon, former head of the Shin Bet domestic security service and chairman of Cytegic, a company that has developed a digital dashboard and tools to help keep companies protected. Israel and the U.S. face some of the most serious cyber assailants in the world, said Daniel Garrie, executive managing partner of cyber-consulting firm Law & Forensics in New York. That forces them to be ‘‘light years ahead’’ in prevention. While attempted hack attacks on Israel reached 2 million a day during last year’s fighting in Gaza, the country has yet to report destructive events such as the theft of data from about 22 million people at the U.S. Office of Personnel Management.


The government push to regulate driverless cars has finally begun

The bill, called the SPY Car Act, would require certain commitments from car manufacturers who want to build driverless or connected cars. For example, under the legislation the Federal Trade Commission would force automakers to use "reasonable measures" to protect the increasingly complex software that helps our cars run smoothly. Together with highway authorities, the FTC would also develop a window sticker that rates a new car's vulnerability to digital attack, in the same way consumers use fuel economy stickers to evaluate a car's potential gas mileage. Hackers who figure out how to take control of a car's brakes, engine or other systems not only pose a danger to those inside the affected vehicle but also to others around it.


Worried About a Cyber-Apocalypse? AIG Wants to Sell You a Policy

“We are listening to our customers, who tell us they are looking for larger limits -- some as high as $1 billion in coverage for cyber property damage and business interruption for larger corporate properties and facilities,” said Dan Riordan, chief executive officer of Zurich Global Corporate in North America. He wouldn’t say how much coverage Zurich might provide. Since the first cyberpolicy was written in the late 1990s, insurers have been unwilling to provide coverage for all losses. Most firms are reluctant to offer policies for property damage resulting from hacking because there’s almost no data available to determine costs, according Tracy Dolin, an analyst at Standard & Poor’s.


5 steps to becoming an enterprise architecture ninja

Enterprise architects have often logged years of IT and business experience, and have outstanding abilities to think both structurally and strategically. But when you ask them to rate what they're doing on a maturity scale -- say 1-5 -- plenty of very competent professionals look at their shoes and mumble 1 or even 0. Despite being tasked with making sure company systems have a solid foundation (and don't topple under their own complexity), managing product integration, digital transformation, and IT roadmaps, they don't often take the time to benchmark their own skills and contributions. If you're an enterprise architect, listen up. Charting your own personal roadmap is key to explaining the impact of your role, and winning respect and influence.


6 Smart Jewellery For The Perfect Fusion Of Fashion And Tech

While the Nike+ FuelBand, Fitbit Flex and Jawbone UP demonstrated potential in wearable computing with their tracking capabilities and accompanying mobile apps, the devices themselves looked more at home in the gym than in ones everyday life. Nowadays, a new breed of wearables, more female-targeted line of devices are starting to emerge, offering features that extend beyond health and fitness, as well as the look of “real” jewellery made with metals and stones instead of bulky plastic bands. The “Smart jewellery” range includes a wide range of devices: From those that keep one aware of important calls and texts to those that are meant to serve as protection for women in peril.


Your body, the battery: Powering gadgets from human “biofuel”

When it comes to energy-rich bodily fluids, blood is hard to beat. Plasma, the liquid component of blood, is constantly suffused with dissolved glucose, our cells’ primary source of energy. Most EFCs that have been developed to date target this molecule. The first EFC that could draw power directly from an organism's bloodstream was created in 2010. Its French developers implanted the inch-long device into the abdomen of a live rat, where it operated successfully for 11 days—apparently without much discomfort on the part of the host. During this time, it continually generated around two microwatts of power, which is more than enough to power a pacemaker in theory.


Outsourcing: How Cyber Resilient Are You?

In an effort to improve upon the results of the SEC and DFS reports, issuances from the FFIEC and FINRA provide third-party cyber guidance with a focus on resilience (i.e., the ability to withstand and recover from a cyber attack). Consistent with the regulators’ overall approach to cybersecurity, the guidance suggests an approach that is more advisory than enforcement-oriented and is principles-based rather than prescriptive. A prescriptive approach would make less sense at this stage, as cyber risks are evolving rapidly and financial institutions each have idiosyncratic exposures based on the particularities of the institution.


Interview: When Technology and Design Collide, then Collude

The two are intrinsically interlinked. Both provide inspiration for the other. There is an element of truth that sometimes limitations of technology can prevent designers from thinking big, but technology often comes up with inspiration and new ideas and approaches that design has never thought about. The theory is about incremental innovation versus disruptive innovation. It suggests that incremental innovation is climbing to the top of the existing hill that you're standing on. It's limited by the size of that hill. That's often what a lot of UX designers focus on. They run usability testing, trying to tweak and improve a particular product and service. But they lose sight of the fact that there might be other bigger mountains out there to climb.


How to find agility in the cloud

"We needed to move from where deployment was a post-application function to a Dev Ops culture," Juneja says. "We needed to bring in some talent that could address the leadership gap we had in cloud and in Dev Ops. The benefit of stabilizing and thinking about next-gen concurrently is we were able to do a lot of analysis of our existing stack, our existing team functions — idenfity the things we would do and not do in the new environment. This is where we identified the gaps in our skills and leadership. We brought in a vice president for cloud that had done cloud transformation for a healthcare company. We built a center of excellence for Dev Ops and brought in a leader from a major transactions company."


When DevOps isn't enough, try NoOps

For NoOps to work, it needs an IT platform that developers don’t need to worry about in terms of resource constraints – and that’s where the cloud comes in. Once the hardware is out of the hands of the organisation, the operations side of the equation becomes someone else’s problem. The cloud provider has the job of provisioning, monitoring and maintaining the hardware and – provided a suitable service level agreement (SLA) has been settled – the physical aspects of the platform become relatively immaterial. ... All too often, even in cascade projects, developers fall into the trap of believing their operational environment will perform the same as their development one, forgetting that much of what they do is self-contained in their own workstation or hived away from the vagaries of the main network.



Quote for the day:

"Brilliant strategy is the best route to desirable ends with available means." -- Max McKeown

July 24, 2015

Top Big Data Challenges, Revisited

There's also a shortage of people who can get the most out of all this new data. Harvard business review called Data Scientist the sexiest job of the 21st century (it certainly sounds sexier than "actuary," which is perhaps the closest 20th century equivalent!). Data Scientists have deep analytic and statistical skills combined with knowledge of the business. They are in high demand and they command high salaries. What's new is that technology is helping to remove some of the the bottlenecks. For example there are now easier to use, more automated predictive analytics tools that can be deployed by, say, marketing staff looking to optimize campaigns.


Stakeholder Engagement: The Elephant in the Room

A process of any description is, in many ways, a means to an end—it helps us achieve a goal, output or outcome. Yet different stakeholders will want to achieve different things from that process—and sometimes these needs and wants might conflict. Uncovering these areas of disagreement early, discussing them and working to gain consensus is extremely beneficial. This builds engagement from the very beginning, makes it much more likely that we’ll foresee issues, and makes it much more likely that the process will deliver the benefits and outcomes that we are aiming for.


How IIT Bombay is popularizing robotics in India through its flagship initiative, e-Yantra

e-Yantra Lab Setup Initiative (eLSI) provides guidance in setting up Robotics labs at colleges and trains a team of 4 teachers from each college. The eLSI does this through a three pronged approach. The first component of the e-Yantra Lab Setup initiative trains teachers through a two-day workshop on basic concepts in Embedded systems and Micro-controller programming, conducted at a coordinating college termed Nodal Center (NC), in different regions of the country. At the end of the workshop teacher team from each participating college is given a robotic kit to participate in an extended training program called Task Based Training (TBT).


Cars May Soon Understand More of What You Say

Ortiz says that such technology is now in the vehicle production pipeline, which means it may appear within a few years. It will primarily allow for more natural control of dashboard features and retrieval of information such as directions. “In the navigation domain, we’re developing methods to describe points of interest more abstractly,” he says. “I don’t always know the exact address of where I want to go. I want to be able to say ‘I want to go to a restaurant in the marina near the ballpark.’ “ Nuance came to dominate the market for voice-recognition technology over the past decade after acquiring various other companies in that space.


Cloud inventory management for CIOs: Build guardrails, not roadblocks

Organizations of all kinds are encountering workers using cloud apps without IT's knowledge. The usage stems from both individual workers seeking out cloud apps to help them perform a particular task, as well as entire departments lighting up enterprise apps in the cloud, said Forrester Research analyst Lauren Nelson. It's easy to do in both cases and often creates efficiencies in business processes for the workers and departments involved. Unfortunately, many CIOs are left out of the loop, and as a result, they quickly lose track of what apps are performing which functions, Nelson said. "You think you've identified what's being used, but then you find there are people using apps that didn't go through your process."


CIOs say AppleCare for Enterprise is lacking

Some of the services CIOs want from AppleCare for Enterprise, such as setup, training and technical support, are available as part of Apple's Joint Venture program, but it's managed by Apple retail stores and all eligible products must be purchased through Apple directly. Appley says Shorenstein pays $500 per year for this service and it covers up to five individuals, each of whom can receive support for multiple Apple devices. "It helps us get to the front of the line at the Genius Bar," he says. Businesses that pay for membership in the Joint Venture program also get up to 6 hours of in-store training each year and receive in-store assistance with device setup, including supervised data transfer from other devices.


The 12 disruptive tech trends you need to know

People pay plenty of money for consulting giants to help them figure out which technology trends are fads and which will stick. You could go that route, or get the same thing from the McKinsey Global Institute’s in-house think-tank for the cost of a new book. No Ordinary Disruption: The Four Global Forces Breaking All the Trends, was written by McKinsey directors Richard Dobbs, James Manyika, and Jonathan Woetzel, and offers insight into which developments will have the greatest impact on the business world in coming decades. Below, we’re recapping their list of the “Disruptive Dozen”—the technologies the group believes have the greatest potential to remake today’s business landscape.


Combining Knowledge- and Data-driven Methods for De-identification of Clinical Narratives

A recent promise and the potential of wider availability of data from Electronic Health Records (EHRs) to support clinical research are often hindered by personal health information that is present in EHRs, raising a number of ethical and legal issues. De-identification of such data is therefore one of the main pre-requisites for using EHRs in clinical research. As a result, there is a growing interest for automated de-identification methods to ultimately aid accessibility to data by removing Protected Health Information (PHI) from clinical records. De-identification of unstructured data in particular is challenging, as PHI can appear virtually anywhere in a clinical narrative or letter.


Worried About a Cyber-Apocalypse? AIG Wants to Sell You a Policy

Zurich Insurance Group AG and Munich Re say they are considering offering infrastructure-damage policies similar to AIG’s. None of the companies has signed a contract. “We are listening to our customers, who tell us they are looking for larger limits -- some as high as $1 billion in coverage for cyber property damage and business interruption for larger corporate properties and facilities,” said Dan Riordan, chief executive officer of Zurich Global Corporate in North America. He wouldn’t say how much coverage Zurich might provide. Since the first cyberpolicy was written in the late 1990s, insurers have been unwilling to provide coverage for all losses.


The Hierarchy of Needs

Related to software quality this means for one thing that robustness, safety and understandability will become relevant only if the software is runnable on the customer’s device and performs the tasks it is intended for. Further it means that an increase in functionality may not result in a higher quality experience on the customer’s side if his or her functional needs are saturated but higher needs are not. For a potential customer functionality is central. For a customer who uses the software already the functionality is more of a given fact. He or she will often expect other and higher quality attributes instead in a new release.




Quote for the day:

"The problems we have today, cannot be solved by thinking the way we thought when we created them." -- Albert Einstein

July 23, 2015

The Art of Empathetic Observation

Many technical people immediately presume that we can’t learn from ordinary people who are not experts in the technologies related to our business. One of the participants in my session this week quoted Henry Ford who once said: “If I had asked people what they wanted, they would have said faster horses.” Yes, it’s true that most people can’t imagine something they have never before seen or experienced. ... So if we can’t ask consumers what they want from us, how do we gain the understanding we need to create breakthrough innovations? The art of empathetic observation is a means to observe and listen to customers as they – Make their own purchase decisions; – Use our products or services


Delivering Application-Centric Network and Security Services

Automation creates a standardized repeatable process that helps accelerate delivery, reducing the time needed to perform the task. At the same time automation also improves the consistency and reliability of the final configuration by elimination of manual errors. Finally automation reduces operational costs by eliminating many manual tasks, and improves development productivity by delivering application environments to engineers faster. vRealize Automation, used in conjunction with NSX, automates an application’s network connectivity, security, performance, and availability.


Germany's startup policy blasted

"Ironically, regarding startups, the Digital Agenda remains vague," Dirks said. The telecoms exec advocated cutting the bureaucratic red-tape that can hinder smaller firms, especially in their first four years of existence. He also said that new legislation around venture capital law is urgently needed to spur investment in young companies. German venture capital-backed tech firms attracted about $1.28bn in funding in 2014, according to CB Insights, a dramatic increase over the $578m raised the previous year, but it still pales in comparison to $21.8bn that flowed to California startups in 2014. In addition to more startup support, Bitkom said that education and training is another key area that the German government should focus on.


Empathic Design: Is Empathy the UX Holy Grail?

Empathic design is the process of developing an understanding of users, not just their overt needs, but of their constraints, practices, problem-solving approaches, contexts, and the interrelations between people as a whole. The aim of researching users in such a way is to help designers identify their users' underlying needs (i.e. those that are not instantly apparent or accessible through questioning alone). Once we have established these needs we can develop new problem-solving approaches that accommodate the users' constraints and exploit (in a nice way) their capabilities. The ultimate aim is to improve the user's or consumer's experience by tailoring the product to their explicit, implicit, and latent needs.


Stop hiring data scientists until you’re ready for data science

In the words of the data scientist I spoke with last week: “Anyone can hire a data scientist. Not every HR department or organization is ready for data science. Generating reports are not analytics — even if they’re prettier or faster reports. Dashboards are not analytics — even if they’re really pretty dashboards. More than anyone, HR should understand the devastating impact of changing job description on someone that’s been hired.” Ironically, that data scientist hire is perhaps one of the most brilliant and strategic hires that HR department has ever made — perhaps ever. But only if they let her do what she was hired to do. HR data scientists can help move HR from being tactical to strategic, using an analytics approach to highlight never seen before patterns, make decisions based on data, and the like.


Why enterprises aren't getting the full value they expect from cloud services

Negative perceptions of vendors have left decision-makers hesitant to adopt as-a-service platforms, as nearly half of the surveyed respondents feel their service providers are unwilling to cannibalize their existing revenue models. Another reason for slow adoption may be a lack of consensus within organizations about the benefits and value as-a-service offerings can provide. When asked how important adoption was, 53% of operations leaders saw it as business-critical, while only 29% of middle managers agreed when asked the same question. With these concerns in mind, it’s no wonder that enterprises are being extremely methodical when it comes to cloud migration.


IBM’s Machine Learning Tech Takes on Solar Power’s Flakiness

The project used up a big chunk of the petabyte of storage dedicated to it, tapping into the DoE’s high-performance computing facilities for processing power. Data sources include sensor networks, local weather stations, cloud motion tracked by sky cameras and satellites, and historical records going back several decades. Variables are plugged into multiple forecasting models, with the system continuously tracking how they work under varying conditions. “We can actually see which one of those models or forecasting systems has performed better than others,” said Hamann, adding that the technology’s applications aren’t confined to solar.


A Case for Diversity in Our Workspaces

We can stop assuming that the same space will work for everyone all the time. We can provide lighting options. Allow pets in the workplace. Find appropriate ways of taking time out to make ourselves the creative space we need for problem solving. Create options that don’t make people feel uncomfortable: it is easier to say “I’m just going to make a coffee” than it is to say “I just need to move around a bit to re-establish where my body is in space”; it is easier to stroke the office dog than to say “I just need to re-calibrate my sense of touch so I can feel the keys on the keyboard when I code”; it’s easier to allow headphones at least some of the time than to expect everyone to be able to tune out the background hum of the open-plan workspace and pair programming teams.


End-User Computing: A Challenge for Data Governance Leadership

Data governance is not in the same position as IT with respect to EUC, and does not have to accept IT’s views on EUC. However, EUC is often not a priority for data governance. As noted earlier, many data governance units focus their efforts on dealing with IT and operations, and there is no natural constituency that represents EUC that data governance can deal with. Equally, EUC is often somewhat mysterious to data governance staff. There is not a lot written about it in the literature. Other, more familiar topics such as data quality and data definitions are likely to be areas in which data governance focuses its activities.


Cyber-hijacking: Hackers may try to take the wheel from drivers remotely

Among the most vivid examples came this week, when security researchers Charlie Miller and Chris Valasek demonstrated that they could hijack a vehicle over the Internet. By hacking into a 2014 Jeep Cherokee, the researchers were able to turn the steering wheel, briefly disable the brakes and shut down the engine. They also found readily accessible Internet links to thousands of Jeeps, Dodges and Chryslers that feature a proprietary wireless entertainment and navigation system called Uconnect. Valasek and Miller said they could, by merely typing the right series of commands, hack into these vehicles almost anywhere they might be driving.



Quote for the day:

"Now is the time. Needs are great, but your possibilities are greater." -- Bill Blackman

July 22, 2015

Java 9's New HTTP/2 and REPL

All of this means that support for HTTP/2 is a core piece of Java functionality for the next decade. It also allows us to revisit our old assumptions, rewrite the APIs and provide a "second bite of the apple". HTTP/2 will be a major API for every developer for years to come. The new API makes a clean break with the past, by abandoning any attempt to maintain protocol independence. Instead, the API focuses solely on HTTP, but with the additional understanding that HTTP/2 is not fundamentally changing semantics. Therefore, the API can be independent of HTTP version, whilst still providing support for the new framing and connection handling parts of the protocol.


4 ways to manage an overwhelming number of IT initiatives

While it may be tempting to simply stop entertaining new initiatives, this course of action is fraught with risk. Many IT services can now be provisioned with little more than a credit card, and any gaps can be filled by armies of willing consultants. Hanging out a metaphorical "No room at the inn" sign may cause constituents to go elsewhere. Furthermore, technology is changing very rapidly, and a new initiative may invalidate one or more existing initiatives. A new cloud service being requested by operations could eliminate a costly application upgrade or reporting tool, just as a new request by marketing could finally gain support for a less exciting, but dependent, infrastructure upgrade.


What Is A Creative Data Scientist Worth?

For some time, pockets of IT innovators have been creating industrial art which appeals to the head as well as the heart. People like the late Steve Jobs and Apple AAPL -0.12% design chief Jonathan Ive - true IT artists. I remember laying eyes on their ‘iLamp’ G4 iMac back in 2002. It was so original and ridiculously gorgeous. For the first time in my life, I forgot about MB, GB, or Ghz. I just wanted an iMac. And now, some data science outputs are being considered fine art in their own right. As well as creating competitive advantage, spawning new products, identifying fraud patterns, and changing business processes in ways that, until now, could only live in the imagination, these beautiful, hypnotic images are adding a new dimension; bringing data analytics to life.


What’s behind Linux’s new Cloud Native Computing Foundation?

The CNCF is advancing the discussion to consider how containers should be managed, not just how they’re created. That’s a good thing for the industry, and for end users. Big enterprise buyers aren’t going to really use containers until there are are mature platforms for managing them. ... Because the CNCF is attempting to create a reference architecture for running applications and containers, and Google’s Kubernetes will likely play a big role in that. AWS and Microsoft already have a reference architecture for running containers and they’re not looking to support competitor Google’s.


Unpacking technical jargon in machine learning

Machine learning is a child of statistics, computer science, and mathematical optimization. Along the way, it took inspiration from information theory, neural science, theoretical physics, and many other fields. Machine learning papers are often full of impenetrable mathematics and technical jargon. To make matters worse, sometimes the same methods were invented multiple times in different fields, under different names. The result is a new language that is unfamiliar even to experts in one of the originating fields. As a field, machine learning is relatively young. Large-scale applications of machine learning only started to appear in the last two decades. This aided the development of data science as a profession.


Next-generation endpoint protection not as easy as it sounds

The value of endpoint protection platforms is that they can identify specific attacks and speed the response to them once they are detected. They do this by gathering information about communications that go on among endpoints and other devices on the network, as well as changes made to the endpoint itself that may indicate compromise. The database of this endpoint telemetry then becomes a forensic tool for investigating attacks, mapping how they unfolded, discovering what devices need remediation and perhaps predicting what threat might arise next.


The Importance Of Design Thinking For Big Data Startups

Rather than thinking about competing products, think about competing processes. If you are selling into the marketing department, what is their current process for accomplishing the task you are serving? Your goal should be to make that process faster and more efficient. Additional features are great but if a potential client can do X faster with their current process, your offering of Y & Z doesn’t matter. You may win early but it will be difficult to last. Slack has done a remarkable job of accomplishing this. They are in a super competitive space of workplace collaboration. They did not win because of features; they won because of ease and simplicity.


Information security governance maturing, says Gartner

"The primary reasons for establishing this reporting line outside of IT are to improve separation between execution and oversight, to increase the corporate profile of the information security function and to break the mindset among employees and stakeholders that security is an IT problem," said Scholtz. According to Gartner, organisations increasingly recognise that security must be managed as a business risk issue, and not just as an operational IT issue. There is also an increasing understanding that cyber security challenges go beyond the traditional realm of IT into areas such as operational technology and the internet of things (IoT).


Hadoop for HPC—It Just Makes Sense

An increasing number of companies that already use High Performance Computing (HPC) clusters running a Lustre file system for simulations sees the value of their existing data and future data. They are interested in what that data might reveal running Hadoop analytics on it. But building out a Hadoop cluster with massive amounts of local storage and replicating their data on the Hadoop Distributed File System (HDFS) is a considerably extensive and expensive undertaking, especially when the data already resides in a POSIX compliant Lustre file system. Today, these companies can adopt analytics written for Hadoop and run them on their HPC clusters.


7 Habits of Highly Effective Monitoring Infrastructures

Monolithic monitoring tools, on the other hand, often assume that you’ll never need to export the data they collect for you. The classic example is Nagios, which is, as you probably know, a tool designed to collect availability data at around 1-minute resolution. Because Nagios views itself as a monolithic monitoring tool, a plethora of single-purpose tools have sprung into being, for no other purpose than to take data from Nagios and place it in X, where X is some other monitoring tool from which it is usually even more difficult to extract the monitoring data. What you end up with is the now infamous anti-pattern of overly complex, difficult to repurpose, impossible to scale, single-purpose monitoring systems. Each tool we add to this chain locks us in further to the rest of the tool chain, by making it more difficult to replace any single piece.



Quote for the day:

"Corporate governance is not a matter or right or wrong 'it is more nuanced than that." -- Advocate Johan Myburgh

July 21, 2015

HTC on why 2016 is a 'critical' year for virtual reality

That's been a common reaction for anyone who has tried the Vive, the virtual reality setup built by partners HTC and Valve, according to Gattis, who shared the anecdote in an interview on Thursday. HTC will be counting on that wow factor as it pushes an entirely new product from its core business of making smartphones. It isn't alone. While HTC and Valve, best known for its Steam online gaming platform, have promised to launch the Vive later this year, Facebook's Oculus and Sony are expected to launch their own virtual reality headsets in 2016. Next year is shaping up to be when the public will get its first real look at this technology. "The industry needs a successful first year," Gattis said. "Next year is critical."


Google Fights Export Controls For 'Intrusion Software'

"It would be a disastrous outcome if an export regulation intended to make people more secure resulted in billions of users across the globe becoming persistently less secure," Martin and Willis write. In a letter sent to the US Commerce Department's Bureau of Industry and Security (BIS), Google argues that the proposed rules are too broad and vague, requiring potential export licenses for email, code review systems, instant messages, and perhaps even in-person conversation, despite assurances to the contrary. The rules, suggest Martin and Willis, could require an export license to report a bug and could limit the ability of companies to share information about intrusion software.


New PCI DSS guidance: increased compliance and cost implications

The PCI DSS’s additional guidance (released in June 2015) on maintaining business-as-usual compliance will help organisations assess and document how they maintain PCI DSS compliance on an ongoing basis. ... The DESV is intended to “provide greater assurance that PCI DSS controls are maintained effectively and on a continuous basis through validation of business-as-usual (BAU) processes, and increased validation and scoping consideration,” according to the FAQ sectionon the PCI SSC website. The PCI SSC stresses that the DESV can be used to complement any entity’s PCI DSS compliance efforts, and encourages the adoption of DESV as best practice – even for organisations that are not designated entities.


Intel's IoT future could come out of this accelerator

In an IoT future, software and hardware develop will meld into a single product - the chip that will give online life to refrigerators, washing machines, smart wearables, and the million other little things that will constantly upload, download, and analyze data to the nth degree. To succeed in that game, companies need the help of startups that can develop services, user interfaces, data analytics, and engineering to make interconnectivity work. In an increasingly interconnected world, tech firms have come to realize that they cannot do it all by themselves - and that by partnering with others, they can increase their own value a great deal more than they could by trying to keep everything in house.


Unifying Information Management – Why it Matters

Not surprising that the major obstacles continue to be the proliferation of silos of data sets, the lack of ability to show ROI and the buy-in/funding from executive management. Today’s data environment is getting more and more complex. We have evangelists for big data, discovery platforms, agile labs and cloud services achieving great success in providing capability for quick insights, realisation to value and fail fast discovery processes. However, these are often delivered as point solutions that result in further data silos. This adds even more complexity to the data environment/landscape. ... In its most basic form, every new initiative needs to be assessed as to its data asset impact.


Business cases emerge from growing pains of Hadoop 1.0

Chris Brown, big data lead at high-performance computing consultancy OCF, believes one of the issues is that the technology is simply not suitable for most organisations unless they are processing vast amounts of data – at least 1TB. “The lighthouse accounts for this are Amazon, Yahoo and Walmart, which are huge corporations – but we just don’t have that many in the UK apart from a few telcos, retailers or financial services organisations,” he says.  “So, for the small and medium-sized companies that are in the majority here, it’s huge overkill and is just too big an exercise for them to take on.” Another issue is generating a return on investment (ROI) – a situation exacerbated by the skills shortage Gartner cites, as it inevitably makes expertise expensive to buy in.


5 Questions to Ask Before Labeling a Business with the ‘S-Word’

We tend to call everything ‘sustainability,’ for the lack of a better term to describe the wide cross-section of business activities we deem ‘good.’ That does not make each fairly virtuous act sustainable. It doesn’t. Most of the mislabeled ‘good’ just compares favorably to a more deplorable, drummed-up alternative; it might be more bearable or better for the environment, but advantageous comparisons do not equate to sustainability. Consumers fall so hard for the romantic concept that at times the term is little more than nebulous and trite. More simply, few business activities deserve the ultimate acknowledgement that many readily, and without rigor, deploy.


Making the Case for Remote Power Supply Monitoring

A proactive approach to IT maintenance based on predictive analytics winds up saving IT organizations money, Edward Wirth, director of business development, marketing and sales for Power Service Concepts, a provider of battery environment support services, said. Wirth is speaking on the subject at the upcoming Data Center World conference in National Harbor, Maryland, this September. Wirth said remote monitoring also addresses a number of tactical issues. Gaining access to data centers has become increasingly problematic for third-party specialists. Background checks are now routinely required, and the time slots being made available to those third-party specialists are usually now on the weekends or after normal business hours.


MVC, Angular JS CRUD using WEB API 2 with Stored Procedure

In Internet there are lots of examples related to WEB API using Entity Framework. But in community forum I saw many questions was been asked by members for a simple example using WEB API Entity Framework with Stored Procedure. I search a lot to find a simple Article which explains a simple way to perform CRUD operation using Stored Procedure with MVC and Web API. But I couldn’t able to find any article which explains all this .I plan to make a simple web application using MVC 5 ,Angular JS ,WEB API to perform CRUD(Create/Read/Update and Delete) using Entity Framework with Stored procedure.


CEO Nadella talks Microsoft's mobile ambitions, Windows 10 strategy, HoloLens and more

We will do everything we have to do to make sure we're making progress on phones. We have them. Even today Terry (Myerson, the head of Windows and Devices) reinforced, again, yes, we will have premium Lumias coming this year. If there are a lot of OEMs, we'll have one strategy. If there are no OEMs, we'll have one strategy. We are committed to having the phones in these three segments. And I think the operational details will become clear to people as they see it. I want people to evaluate us on the phones that we produce, but not the inside baseball -- what are we doing to produce -- because that should not be relevant to our broad consumers. It may be relevant to people like you who are critiquing us. That's okay. But what matters to me is what customers care.



Quote for the day:

"Thinking too well of people often allows them to be better than they otherwise would." -- Nelson Mandela