March 11, 2016

RSA 2016: Data compliance beyond the firewall

The feedback from RSA from security professionals was that you need to start with a data classification policy and you need to start considering how to isolate the data from where it resides. So, if you look at new solutions that allow you to manage your encryption keys around the data, regardless of where the data is structured – solutions such as Ionic, for instance – you’ll see that it’s a new way of looking at data storage and at the implications of where you store data. That said, to do it the right way you need not only technology, but you most likely need help from your in-house solicitor to make sure you fully master the legal ramifications of where your data [resides]. And that’s notwithstanding any requirements for e-discovery, where you may need to get access to data.


Is Breach Notification A Part Of Your Incident Response Plan?

Don’t notify too early. You’ll be criticized either way, so let the investigators help uncover as much information as they can about what happened to help you better communicate the facts. Consider issuing a hold statement in the meantime – something that states you’re aware of the issue.  Define what constitutes a breach vs a security incident in your business partner and service provider contracts. This is important from a cyber insurance claims analysis perspective to help with breach notification costs. Cultivate relationships with local law enforcement, your local FBI and secret service gurus – before a breach event. Go above and beyond state attorney general expectations and be proactive with engaging with them during a breach event; you don’t want them to hear about the breach in the news before you tell them.


Got a new USB-C device? 19 accessories that will help

There's a new USB in town -- the Type-C port. Smaller than the familiar USB Type-A, the USB-C plug uses the latest USB 3.1 specification, which means it's not only faster but reversible, eliminating the frustration of trying to insert a USB plug upside-down. Able to carry up to 100 watts of power (six times the USB 3.0 limit), a USB-C port can deliver up to 10Gbps -- double that of current USB 3.0 devices. Although USB-C has been on its way for some time, there haven't been a lot of devices that use it -- until recently. Apple's 12-inch MacBook started the trend last year and was followed by other laptops , tablets and smartphones. And that's only the beginning. The problem: All those micro-USB and mini-USB hubs, cables, chargers and adapters that you've collected over the last several years can't plug into your new USB-C port.


What is bimodal IT and what does it mean for the CIO?

Put simply, bimodal IT involves running two separate modes of IT delivery within a business; one is a traditional, safe execution model, while the second is more exploratory, agile and fast.  The approach is of particular interest to enterprises with legacy IT because it allows tried-and-true, existing systems to continue underpinning core business processes while newer, more agile delivery models work alongside them, without having to deal with the disruption of ripping everything up and starting again. But what could bimodal IT look like on a practical level? A useful analogy is thinking of bimodal IT as a swimming pool with two lanes: a fast lane for slower, more careful swimmers and another lane for faster, more agile swimmers.


Between SSL-cylla and Charib-TLS

The last 12 to 15 months has seen a significant upheaval in the threat landscape for securing Internet communications. In late 2014, security researchers at Google published the details of an attack they called POODLE (for Padding Oracle on Downgraded Legacy Encryption), which exploited a deficiency in one of the most common security protocols used on the Internet, Secure Sockets Layer (SSL), and allowed an attacker to determine the encryption key used in a supposedly secure connection and decrypt the data in transit. Despite the fact that this particular protocol was developed by Netscape in the 1990s and had been replaced by a better protocol called Transport Layer Security (TLS), version 3 of the SSL protocol (SSLv3) remained in popular use for many years.


Global regulators shape the future of LTE-U, LAA

A hastily-assembled consortium, the LTE-U Forum (LTE-Unlicensed Forum), defined a set of loose rules explaining how LTE could work in 5GHz, with some modifications that they claimed would ensure co-existence with Wi-Fi. The goal of LTE-U was to get product to market quickly in the US, establishing working trials and networks without delay and meeting the commercial requirements of its proponents (selling and deploying new gear as soon as possible). Meanwhile, work started on the European regulators. The movers behind LTE-U lobbied the global cellular standards body, 3GPP, to develop standards that would satisfy ETSI. Since 3GPP-ETSI is a multi-year exercise, this was envisaged as a slower, parallel path to the LTE-U-FCC work.


The next big threat in hacking — data sabotage

"Criminal enterprises — they look for levers within society that are economically tuned to helping them make money," said IOActive's Miessler. "If you could tweak a credit score and get a better rate on money and you're making money by borrowing at better rates, these are things criminal enterprises look at — their ability to modify the system in some way to get an economic return." Manipulating credit scores or bank account numbers is a natural evolution from yesterday's big data breaches, where the personal information on millions of U.S. shoppers, health-care patients and government workers could already be in use for such manipulation schemes. "That's the interesting thing about integrity attacks — they can be highly beneficial to the attacker in that they can often achieve their goals more effectively than a traditional attack," said Steve Grobman


Europe’s CIOs examine impact of new data protection regulation

CIOs must help their businesses to recognise the importance of sanctions emanating from the GDPR. The regulation presents a new challenge, but the current situation regarding data protection is far from ideal, says Jacobs. A company operating across Europe might have to deal with as many as 28 different data privacy regimes. CIOs should see the GDPR as an opportunity, she says. Rather than data protection being a complex puzzle, the regulation should help to provide legal consistency across Europe. “The principle of creating a single regulation across many countries is a good idea,” she says. “But there have been many lobbies around the detail of the regulation and the exact text will not be known until later this year.”


Bitcoin Technology Will Long Outlive Digital Currency

"Bitcoin, if it became broadly accepted, would challenge states’ dominance of the economy. It is designed to prevent monopoly by states or other entities, building a new currency based on shared information and making it hard for any entity to gain control. Politics disappears and a combination of technology and cryptographic proofs is conjured up in its place," he wrote. "Unfortunately, the magic is wearing off. Some of the technological innovations associated with bitcoin will stick around. The political project will not. Rather than overcoming conventional politics, bitcoin is succumbing to it," he wrote. The problem is centered around bitcoin's blockchain, which is a public, decentralized ledger that records every single bitcoin transaction.


The Next Big Thing In Big Data: BDaaS

As well as the “firehose” of tweets it provides analytics tools and applications for making sense of that messy, unstructured data and has trained 4,000 consultants to help businesses put plans into action to profit from them. Another is agricultural manufacturers John Deere, which fits all of its tractors with sensors that stream data about the machinery as well as soil and crop conditions to the MyJohnDeere.com and Farmsight services. Farmers can subscribe to access analytical intelligence on everything from when to order spare parts to where to plant crops. The arrival of Apple’s Watch – perhaps the device that will bring consumer wearables into the mainstream – will doubtlessly bring with it a tsunami of new BDaaS apps.



Quote for the day:


"People will work for a living but they'll die for recognition." -- Lee Odden


March 10, 2016

Designing a modern enterprise architecture

The reason enterprise architectures must change is the confluence of high-speed connectivity and decades of exponential Moore's Law improvements in computing power. This has enabled cheap smartphones to saturate the market and utility-scale IT service providers to create cloud services. Together, these technologies have catalyzed dramatic changes in business. Whether you call it the New Economics of Connections (Gartner) or the Unbounded Enterprise (AT&T Bell Labs), it means businesses, and consequently IT systems and applications, will increasingly interact not just with people, but devices, virtual objects, and other software in the form of automated business processes and intelligent devices.


Biggest-Ever Blockchain Trial is Only the Beginning

Grant described the trial in similarly ambitious terms, indicating that it sent four technology providers specifications for the test – Chain, IBM, Intel and Eris (which delivered versions of the concept on its platform and Ethereum) – that included design specs for three specific trading scenarios. "We had [banks] issuing, trading and redeeming commercial paper, and we had every one of those banks do that in the platform," Grant said. He explained that all banks were encouraged to transact with at least one other bank over the course of the trial, with Grant suggesting that "at least 60 trades" were completed in the simulations. No real funds were exchanged as part of the test. Grant suggested that two of R3’s partners declined to participate due to what he called a "significant resource requirement".


Is DevOps good or bad for security?

Miller views that as one of the benefits of DevOps. “Because CD emphasizes having a code review process, small check-ins and rapid mitigation come with it. If you can deploy four or five times a day, you can mitigate something within hours.” The same applies to spotting breaches, says Sam Guckenheimer from Microsoft’s developer tools team. “With DevOps, you're worried about things like mean time to detect, mean time to remediate, how quickly can I find indicators of compromise. If something anomalous happens on a configuration, you have telemetry that helps you detect, and you keep improving your telemetry – so you get better detection, you get better at spotting indicators of compromise and you get better at remediation.” Continuous deployment makes life harder for attackers in two ways, Guckenheimer explains.


Context is king: Aruba founder talks about future of wireless

Speaking about upcoming wireless standards, Melkote said that 802.11ad would rise to prominence within the next two years. The 60GHz technology doesn’t propagate over great distances or through thick barriers, but offers the possibility of very high throughput. “Initially, it was envisioned as a high-speed replacement for cable,” he said. “If you’re trying for coverage, it’s not the right technology, but if you’re trying to provide capacity, it can be a good technology.” But he cautioned that it is still very early in the game where 802.11ad is concerned, and that there aren’t even chipsets yet available. “The big thing that I look for here is the economics – can you get to a price point that is palatable for the end user?” Melkote said.


The Data Science Puzzle, Explained

While one may not agree entirely (or even minimally) with my opinion on much of this terminology, there may still be something one can get out of this. Several concepts central to data science will be examined. Or, at least, central in my opinion. I will do my best to put forth how they relate to one another and how they fit together as individual pieces of a larger puzzle. As an example of somewhat divergent opinions, and prior to considering any of the concepts individually, KDnuggets' Gregory Piatetsky-Shapiro has put together the following Venn diagram which outlines the relationship between the very same data science terminology we will be considering herein. The reader is encouraged to compare this Venn diagram with Drew Conway's now famous data science Venn diagram, as well as my own discussion below and modified process/relationship diagram near the bottom of the post.


The Benefits of Hiring Freelance Big Data Experts

One of the major benefits gained from going the freelance route is flexibility. Instead of hiring a full time data scientist to oversee all big data projects within an organization, the company instead hires on a per project basis. This is especially important for smaller businesses, since the time between big data projects at that level can often be lengthy. Passing over the full time option means a business wouldn’t have to worry about paying a big data expert when they have nothing for them to do. Hiring based on the project means a smarter use of limited resources. This added flexibility also leads to choosing data experts based off of their individual talents. For example, if a big data project requires hiring a data scientist with expertise in sales, the small business can do so. Their fees aren’t based off of a salary but rather on the milestones reached in the project.


Digital Hijackers – the rising threat of ransomware

Ransomware is a cyber version of kidnapping, with the same motives: money. It works like a virus that secretly encrypts files. Victims don’t get the key until paying the ransom. It’s as if instead of a thief stealing your car, they took the car keys and put them in a safe left in your garage. You don’t get the combination to the safe, and use of your car unless you pay up. ... As the attacks have gotten more advanced and correspondingly expensive to develop, they have also become more costly, with an average ransom of about $300 per infected host. What is an extortionate annoyance to someone trying to get their family photo library back can be a significant business expense, both in the ransom itself and the indirect costs of operational disruption and cleanup, when faced with a data center full of affected systems.


Defining 'reachability' on the global Internet

Each geographic market has Internet Service Providers (ISPs) that connect customers to the Internet, and those local ISPs connect to larger ISPs that ultimately connect to geographies all over the world. Your website sits in data centers or in the cloud with its own Internet connectivity. This combined connection path between your website and these ISPs is how you get to different markets. These days, every business is Internet based, which means your customer can come from any market. Even a North American-focused company is still concerned about dozens of important markets. Global companies can be connecting to customers in up to 800 markets. Knowing how well your web assets can reach a market allows you to plan business expansion, plan cloud, CDN and hosting investments, and tune your application and performance metrics by market.


VMware Virtual SAN: The Technology And Its Future

The economics of storage are skewed in favor of all-flash for an increasing number of use cases. For me, our experience with the Virtual SAN cluster deployed as part of the Hands-On Lab (HOL) infrastructure in VMworld 2014 was an eye opener. The storage workload generated by 100s of concurrent, constantly churning Labs is not very cache friendly (no surprise here). As such, the VMware IT team used a large number of spindles for the capacity tier of Virtual SAN to deal with the workload “escaping” the cache. In other words, the spindles were needed for performance, not capacity. We realized that an all-flash hardware would require fewer capacity devices and it would cost less! And that was already the case back in 2014. The main challenge with the high-capacity, low cost SSDs is their low endurance (typically below 1 device-write per day guaranteed for 5 years).


What is IT Service Brokering? Find out in this recent paper

In a very simple and easy-to-understand way, Moore explains the differences between cloud service brokering and service brokering, and why brokerage in IT is needed. He analyzes what makes up a service broker and what parts are IT’s responsibility, such as APIs, micro-services and application services. Moore discusses where to start to become a service broker as well as some initial challenges that IT needs to overcome. Service broker is a new operating model for IT and multiple steps, some substantial and time consuming, are needed. Moore talks about navigating this transition throughout the automation, orchestration and transformation phases. Digital disruption is real, and for IT, among many other aspects, it brings a new type of integration delivery.



Quote for the day:


"There is only one thing that makes a dream impossible to achieve: the fear of failure." -- Paulo Coelho


March 09, 2016

How to avoid collaboration overload

How your business take advantage of collaboration without pushing your most valuable employees straight into a burn-and-churn cycle? The answer is data, says Duggan. Being able to track projects, collaborative efforts and interpersonal dependencies is key to making sure no one is taking on too much, and that workloads are distributed evenly so that bottlenecks don't occur, he says. Duggan says that the number-1 barrier to operational efficiency is accurate tracking of interdepartmental dependencies. In the past, CIOs and managers would direct their teams to focus solely on their own projects and the result was a very siloed organization; over the past decade collaboration has become the norm and so the emphasis must change to understand the rewards versus the risks in that new mindset, Duggan says.


5 Chrome extensions that reduce distraction while you work

Time online is more likely to kill productivity than enhance it. Think of all the work hours you’ve wasted scrolling through your Facebook feed or going down the Wikipedia rabbit hole. But with the right Chrome extensions, you can minimize these distractions and actually increase your productivity. ... If you don’t like the reports you’re getting from TimeStats, you need this extension. Rather than blocking websites outright, StayFocusd lets you allot the amount of time you can spend on your favorite distractions. But once you reach that limit, the site is blocked for the rest of the day. StayFocusd is very configurable. In addition to blocking entire sites, it lets you control access to specific subdomains, paths, pages, and content


Cyber security tools tend to pile up. Here’s how to rationalize them

Companies often begin the security rationalization process after accumulating a portfolio of tools over the years (i.e. penetration testers, web-application, and code scanners) or through mergers and acquisitions or shifting business strategies. If your organization has typically purchased every tool, the practice is a great way to spot redundancies. For those who have postponed major purchases, the rationalization process will highlight gaps or where too little attention has been paid and there may be vulnerabilities. Put simply, the best rationalization projects enhance new and more customer-centric ways of delivering services by seamlessly integrating IT into business processes - even as demand grows exponentially.


These technologies will blow the lid off data storage

"Very soon flash will be cheaper than rotating media," said Siva Sivaram, executive vice president of memory at SanDisk. Meanwhile, Seagate has demonstrated its heat-assisted magnetic recording (HAMR) for HDDs, which will enable data densities of more than 10 trillion (10Tbits) per square inch. That's 10 times higher than the areal density in today's highest density HDDs. Seagate expects to work with equipment makers in 2017 to demonstrate HAMR products for data center applications, and in 2018 the company expects to begin shipping HAMR drives to broader markets. These recent technology advances are just the latest chapter in the long story of ever-growing storage needs forcing innovations to meet the new demand.


15 Data Security Policies Ignored by Modern Workers

IT isn’t the only department stretched thin. In the past 20 years the economy has grown nearly 60 percent. Corporate profits have increased 20 percent. And wages have stagnated for most Americans. The workday goes from 9 to 7 and the U.S. is among a small club of nations that doesn’t require time off. See the trend? Despite data security policies, everybody is working fast and hard in a dangerous, connected world. At this breakneck speed, IT policies—designed to educate employees and manage risk—are white noise for the modern worker. Clearly, both parties in this relationship have to change—and clearly, that change won’t be easy. In the meantime, IT can buoy data policies with smart technology that does what employees won’t—like continuously back up laptops to ensure business continuity in the face of anything.


Is this the future of the Internet of Things?

Ambient intelligence could transform cities through dynamic routing and signage for both drivers and pedestrians. It could manage mass transit for optimal efficiency based on real-time conditions. It could monitor environmental conditions and mitigate potential hotspots proactively, predict the need for government services and make sure those services are delivered efficiently, spot opportunities to streamline the supply chain and put them into effect automatically. Nanotechnology in your clothing could send environmental data to your smart phone, or charge it from electricity generated as you walk. But why carry a phone when any glass surface, from your bathroom mirror to your kitchen window, could become an interactive interface for checking your calendar, answering email, watching videos, and anything else we do today on our phones and tablets?


The organisation that runs the internet address book is about to declare independence

Barring any last-minute hiccups, though, something remarkable will happen at the meeting. After two years of negotiations, ICANN is set to agree on a reform that would turn it into a new kind of international organisation. If this goes ahead, a crucial global resource, the internet’s address system, will soon be managed by a body that is largely independent of national governments. And some of ICANN’s champions reckon this is just a start. In future, similar outfits could be tasked with handling other internet issues that perplex governments, such as cyber-security and invasions of privacy. The beauty of the internet is its openness. As long as people stick to its technical standards, anybody can add a new branch or service.


Applying the Scientific Method in Data Center Management

Recently, scientists at the State University of New York at Binghamton created a calibrated model of a 41-rack data center to test how accurately one type of software (6SigmaDC) could predict temperatures in that facility and to create a test bed for future experiments. The scientists can configure the data center easily, without fear of disrupting mission critical operations, because the setup is solely for testing. They can also run different workloads to see how those might affect energy use or reliability in the facility. Most enterprise data centers don’t have such flexibility, but they can cordon off sections of their facility as a test bed, as long as they have sufficient scale. For most enterprises, such direct experimentation is impractical. What almost all of them can do is create a calibrated model of their facility and run the experiments in software.


IoT in education: Gonzaga taps ITSM to manage device growth

"The reality of IoT is creeping into organizations ... but it is showing up to college campuses in force," Coppins said. Other EasyVista higher education customers include Fordham University, Samford University, the University of Barcelona and Villanova University.Schools are indeed taking notice of IoT in education, judging from the IoT-focused conference tracks at recent higher education gatherings. In November 2015, the semiannual meeting of the Western Interstate Commission for Higher Education, for example, featured an IoT session. The session's introduction asked, "What do we do when our students arrive on our campuses in Internet-enabled vehicles, wearing Internet-enabled clothing, carrying eight to 10 Internet-enabled devices and with clear expectations that our systems can support them?"


How will blockchain technology transform financial services?

Evangelists say the possibilities are limitless. Applications range from storing client identities to handling cross-border payments, clearing and settling bond or equity trades to smart contracts that are self-executing, such as a credit derivative that pays out automatically if a company goes bust or a bond that regularly pays interest to the holder. Some go as far as to suggest that the technology even offers the potential to disrupt companies that have forged reputations as “disrupters”, such as Uber and Airbnb. At its core, blockchain is a network of computers, all of which must approve a transaction has taken place before it is recorded, in a “chain” of computer code. As with bitcoin — the first application of the technology, applied to money — cryptography is used to keep transactions secure and costs are shared among those in the network.



Quote for the day:


"Data is not information, information is not knowledge, knowledge is not understanding, understanding is not wisdom." -- Clifford Stoll


March 08, 2016

Use a BPM strategy to modernize legacy applications

As is nearly always the case, enterprise architecture may provide an easy path if an "EA model" is available. It would be fair to say that for a major enterprise to modernize legacy applications on a large scale, it should never proceed without first developing an EA model according to one of the established standards such as TOGAF. Where the scope of application modernization projects is more limited, it's possible to recover business process definitions from current applications. Where you have no EA framework for direct BPM mapping, take application workflows and "abstract" them by grouping application features into the business processes they support.


The Other Side of Agile: Ceremonial Development

As you can see, ironically, the Agile Manifesto is very simple. Good Agile practices are much more in the spirit of Kaizen and continuous improvement, as opposed to the sterile doctor prescription of do’s and don’ts that most people associate with Agile. And when I come to realize it, the most successful teams that I’ve worked with have excelled exactly at this — responding and adapting to change. These teams were great at what they did because they had mechanisms in place for the team to continuously improve its own delivery. Truth be told, they weren’talways great because of their code reviews. Or pair-programming. Or Stand-up meetings. Or user stories. These things were sometimes very important in the delivery, but once something becomes routine, it can be hard to take a step back and evaluate if it is still delivering on its value proposition.


Seagate Reveals World's Fastest SSD

Seagate's new SSD is based on the non-volatile memory express (NVMe) interface, which was developed by a cooperative of more than 80 companies and released in March 2011. The NVMe specification defined an optimized register interface, command set and feature set for SSDs using the PCIe interface -- a high-speed serial computer expansion bus standard used in both enterprise and client systems. Intel's SSD 750 series drive, which also uses the NVMe/PCIe interface. The SSD sports read speeds of up to 2,500MB per second or 2.5GB per second. "The unit could be used in an all-flash array or as an accelerated flash tier with hard-disk drives (HDDs) for a more cost-effective hybrid storage alternative," Seagate stated in a news release about the new SSD.


Interview: Laura Galante, FireEye

“How are we not able to solve this problem? Because we don’t have visibility into it? The suspicion is the data is probably sitting there in the private sector because everyone is feeling this too. The perfect marriage was Mandiant sitting there with all of this investigation data and thinking, what if there is something huge here and IP is going out the door? We didn’t know how to think about it, and Mandiant needed intelligence so they hired a few of us out of government to figure out what the data was, how to model and analyse it and that is just what we did.” Galante worked on the APT1 report that was released in February 2013, and this allowed her to see network data on the host side and not just on the network, and understand what malware is sitting there that sends out these alerts.


Breaking the Glass Ceiling in Indian IT Firms

It is not uncommon for women to face unconscious biasness at work, which may impact them negatively and make them feel out of place in a male largely male dominated industry like technology. For instance, unconscious bias can happen when male team members put in long working hours for a project while the female workers may leave the office at fixed times. This can be misconstrued as the male workers contributing more to the project, whereas in reality, both male and female employees could be contributing the same, or the latter even more for that matter. Organizations are now actively working towards mitigating gender bias and bring in more transparency that would make women feel more inclusive. 


Bimodal IT strategy opens up opportunities for innovation

Today's application lifecycle is measured in weeks, not years, meaning neither customers nor employees have the patience for a lengthy software development process. Organizations that are too slow to capitalize on an emerging digital business opportunity lose out to competitors that move quickly. But such a quick process requires using Agile development practices, fostering close cooperation between developers and IT operations, heavily instrumenting applications to measure performance, feature usage and errors, and employing continuous delivery processes that facilitate a steady stream of bug fixes and feature enhancements.


Scrum is Just a Starting Point | The Clever PM

There is certainly value to be had in looking to prescriptive definitions like those found in the Scrum Guide — they provide us all with a common understanding of the component parts of what that particular publisher or consultancy has defined as “Scrum”. It enables us to have intelligent conversations using such jargon words as Product Manager, Scrum Master, Stand Up, Retrospective, and other terms that have only contextual meaning within the world of Scrum. It also provides those who need guidance and assistance in establishing the foundation for Agile practices with some clearly-defined, specifically-actionable, and proven steps to take and ceremonies to implement to achieve their goals.


DHL Asia-Pacific Innovation Centre incubates future logistics technology

“The innovation agenda is not a new one for DHL,” said Mei Pang, vice-president, innovation, solution delivery and service management at DHL customer solutions and innovation in Asia-Pacific. “From an operational point of view, DHL has always known to come out with new things. In 2007, our corporate office in Germany made a decision to invest in a central team to focus on innovation to look at the future of logistics and identify major trends,” Pang told Computer Weekly. “Part of the initiative was to open a conversation with partners, and the approach we take is a very collaborative one where we work with suppliers, customers and academics to focus on the use cases and try to make them practically applicable in our business,” she added. “That concept worked very well in Germany.”


Intel's Pentium Bug Fix Is Proposed as Solution for Dark Pools

The pitch comes as banks have been beset by fines. UBS was fined $14.4 million by the SEC for problems at its private stock-trading platform. Barclays Plc and Credit Suisse Group AG racked up more than $154 million to settle allegations that they misled investors about how their dark pools were managed. Investment Technology Group Inc. agreed to pay $20.3 million for its infractions. Aesthetic Integration was founded by Denis Ignatovich, formerly head of the central risk trading desk at Deutsche Bank AG in London, and Grant Passmore, a mathematician and expert on formal verification.  Passmore said formal verification uses algorithms to analyze other algorithms. Rather than endlessly trying to test possible outcomes, machine reasoning acts like an automated mathematician, creating proofs and theorems to speed up the work.


Testers in TDD teams

The big QA of the Nineties seems history. Many IT organizations have dissolved their QA departments and have spread their testers over Agile teams. However, in many of those teams, the testers are still doing the same manual testing they did in the nineties. Many organizations are therefore still stuck with the same dysfunctional testing they had twenty years ago. The dysfunctionality of Old school QA lies in its excessive use of functional testers. These are professionals specialized in manual testing, but having few technical skills. Their specialization makes functional testers good in 'testing' functionality. However, old school QA has a tendency (and often a commercial interest) to also use these testers to 'check' functionality.



Quote for the day:


"Goals allow you to control the direction of change in your favor." -- Brian Tracy


March 07, 2016

Making Data Easy for Businesses with Cloud Data Services

By taping into these new cloud data services, they can explore data sources, meld data of different types, select the most appropriate analytics tools, and produce actionable insights. And they can do it without necessarily having to engage the IT department and, in some cases, waiting weeks for answers. It’s a drag-and-drop experience. Or, if they choose, they can enlist the IT department to design more sophisticated analyses. At the same time, these new services offer a host of more sophisticated capabilities designed for data scientists and developers—enabling data scientists to analyze complex situations using the most capable analytics tools and providing software programmers and product teams with a dynamic development platform.


Tech Giants Agree: The FBI’s Case Against Apple Is a Joke

While this seems like a natural cause for the technology industry to rally behind, many tech leaders were initially slow to express support for Apple in the matter. As the New York Times reports, several companies also hesitated to support Apple publicly. Some expressed concern over whether this was the right fight to pick, while others worried about public perception. Those concerns appear to have been allayed, at least on the part of the companies who filed Thursday. Their briefs in support of Apple are unequivocal, and use language as forceful as the company’s own.


The Internet of Things Will Make Big Data Look Small

This looming problem is something we’re sure to discuss at Structure Data, scheduled for March 9th and 10th in San Francisco. We’re featuring speakers such as William Ruh of GE, who will talk about the impact the industrial Internet will have on the manufacturing sector; Jerome Dubreuil of Samsung, who will illustrate just how much data connected home devices generate; and a panel of healthcare experts will sort through the dual challenges of the retiring baby boom generation and an explosion in quantified-self health apps. This may sound like a buzzword salad to many of you. But those in charge of the massive players in this market are making moves to get themselves ready for the data deluge from a realized Internet of things.


Government consults on data sharing

“There is huge potential for improving citizens’ lives through data sharing in the UK,” he said. “This consultation will help make sure we get data right and bolster security while making people’s lives better.” The proposals focus on three aims: improving public services, tackling fraud and debt, and allowing the use of data for research purposes. The consultation also looks at access to identified data that is linked and de-identified using defined processes. It said linked datasets can help “gain new insights into the social and economic challenges that citizens and businesses face”.


Can Trust-Based Private Blockchains Be Trusted?

When collusion occurs amongst blockchain parties, they can rewrite their local records regardless of other parties' interests and protestations. Other parties may not even detect that colluders altered the historical record. Even worse, since there is no way to prove which party has the correct record (ie: the objective state of the ledger), the system breaks with multiple objective states and multiple attendant claims to historical record authenticity, none of which are provable. Using dates to prove the correct objective state of the distributed ledger is both useless and immaterial – data can be backdated, after all, it's just ones and zeros that can be rewritten. So, what happens if the parties choose not to follow the rules and fork the historical record of the blockchain? What mechanisms exist for aggrieved parties to respond to collusion, if detected?


Security ops orchestration for a brave new world

There is a massive shortfall in the number of trained security experts to man a typical Security Operations Center (SOC) monitoring the health and safety of a corporation’s digital footprint. It takes almost a decade for security researchers to acquire the skills to defend against modern-day attacks. Frost and Sullivan has forecast a shortfall of 1.5 million trained security experts by 2020. SOC teams, overwhelmed in handling the deluge of low-impact incidents, fail to respond in time or miss altogether early incident alerts flagging serious attacks. There appears to be a solution to deal with this massive human shortfall and empower SOC teams. Serious efforts are afoot to record process as code — or simply put, to use software to automate repetitive but time-consuming tasks while increasing the productivity of individual security experts.


Decentralized Apps: Key Questions from a Bank Innovation Director

Once you start charging fees for use of your dapps, you have to be clear what you are charging for. Are you charging for the license to deploy an own instance of a smart contract and use of the dapp wallet – a bit like buying an app from an App Store? Or for a service provided by an already deployed smart contract? Arguably, since it is really the miners that provide the service of actually executing and validating the transactions, it’s hard to justify charging a service fee for smart contracts, unless there are many value-add off-chain services bundled together with the dapp. Based on that assessment, we may end up with a 'Dapp Store' model, where folks purchase a license to deploy an instance of a well-written, standards-compliant, tested and proven dapp onto a blockchain.


Regulation holds up P2P lenders - British online banking security

Journalists from the BBC have successfully broken into a team member's bank account using what is known as "SIM swap fraud". The scam works by fraudsters informing the victim's mobile network provider that they would like to swap SIM cards — this means the victim's number is transferred to another SIM. The fraudster with the new SIM now has the number registered to the victim's bank accounts, and can therefore receive any activation code sent by the bank via SMS. The genuine phone is blocked, and the criminal uses the codes to get into the customer's account without needing to know their PIN, passwords or banking customer number.


Mine that data to keep that customer

The ability for financial organisations to make the most of data, monitoring and tweaking performance as they go will have a major impact on all areas of business, from the supply chain to marketing. However, the big retail banking institutions sit comfortably behind the fintech start-up challengers whose business models are founded in the cloud, and whose customers are willing to place their trust in this new approach. Real-time data has a big role to play in engaging with consumers, as it enables organisations to understand their customers’ behaviours and attitudes towards their services, and by extension positively influence customer loyalty. High street banks are starting to recognise the need to get better at segmenting consumers into more narrowly-defined groups, and real-time data and the contextual relevance of engagement have vital roles to play here.


BYOD continues to add challenges for IT leaders

Karsten Scherer, global analyst at TEKsystems has seen a trend in recent data surrounding BYOD, but notes that allowing employees to use personal devices presents unique risks to the enterprise. She suggests that businesses have a strong BYOD plan in place, encourage company-wide security awareness, and acknowledge that a significant portion of breaches are often inadvertently caused by employee negligence, rather than criminal hackers. "Every company has a complex ecosystem of systems creating, storing, accessing and analyzing data," she says. "When you extend that ecosystem to include devices outside of your immediate control, that level of complexity increases. You've effectively increased the size of your security perimeter."



Quote for the day:


"Leadership is unlocking people's potential to become better." -- Bill Bradley