January 18, 2014

Under-pressure CIOs fret about their digital project skills
There's a cultural tension between IT's desire to do things clearly and in a predictable way and the way you need to operate with digital projects, Gartner Fellow and vice president Dave Aron said. "Traditional IT people like certainly and clarity and there's not a lot of that in the digital world," he said. "What's happening now is CIOs have to continue to provide that really professional, solid core infrastructure but they also have to deal with their company's need to succeed in an increasingly digital world."


Fridge sends spam emails as attack hits smart gadgets
About 25% of the messages seen by Proofpoint researchers did not pass through laptops, desktops or smartphones, it said. Instead, the malware managed to get itself installed on other smart devices such as kitchen appliances, the home media systems on which people store copied DVDs and web-connected televisions. Many of these gadgets have computer processors onboard and act as a self-contained web server to handle communication and other sophisticated functions.


The Disruptive Potential of Artificial Intelligence Applications
AI is working across many different industries, but I have detailed three examples below of technologies that many people do not realize are already being enabled through artificial intelligence. These cases are also illustrated by examples of technology that you may be very familiar with, but unfamiliar with the data-gathering techniques and artificial intelligence technology behind these systems. This is very important for business leaders across industries to take note of, as the opportunity to differentiate in a mobile and digital world will become increasingly crucial.


REST Services - Security Best Practices
REST is an architectural principle and is not a standard by itself, but recommend the use of standards such as HTTP, URI, XML and JSON and formats such as GIF, MPEG, etc. ... REST services being based on HTTP specifications is prone to all the security vulnerabilities as that of a web application. Thus REST implementation while it is the easier choice due to its inherent advantages, should also be implemented with due considerations to a combination of compensatory security practices


Can we build an artificial superintelligence that won't kill us?
Another reason for a rapid transition from human control to machine control is the one first described by I.J. Good, what we now call recursive self-improvement. An AI with general intelligence would correctly realize that it will be better able to achieve its goals — whatever its goals are — if it does original AI research to improve its own capabilities. That is, self-improvement is a "convergent instrumental value" of almost any "final" values an agent might have, which is part of why self-improvement books and blogs are so popular.


UK Government Takes Control Freak Approach To Tech
“The big spenders are still under control and only work with the big systems integrators,” Chan says. “The small guys can’t get a foothold in big government contracts, and while we still think of multimillion pound contracts and big gesture politics, rather than things that can work in a small way, this will always happen.” Speaking on digital rights, Loz Kaye, leader of the Pirate Party UK, tells Forbes that it would be political suicide to actually legislate for something as unpopular as Cameron’s web filter. But this filter itself is just the tip of the iceberg when it comes to a deep misunderstanding or mistrust of technology.


New China-developed OS takes aim at Android, Windows
The Linux-based COS, which stands for China Operating System, is just the latest OS to come out from the nation, at a time when Android and Windows are found on most smartphones and PCs in the country. The makers of the software have been vocal in wanting to break the U.S. hold over China's software market. "The operating system has already risen to become a national security matter," said Shanghai Liantong Network Communications Technology in a statement on its website.


Machine to machine communications and the security of things
If someone compromises a physical device, then its contents, software, and settings are also compromised. Before you purchase an IoT solution or devices, you have to ask the question, "What information is available to a tech savvy thief?" Hopefully the answer is "none" but don't expect that to be the answer you get. Expect that any of your devices can be compromised and any data on them can be accessed. Be sure that your device vendor is aware of physical security and that you've covered the bases with him or her.


CIO considerations for digital transformation in 2014
Now is a golden age for pioneering CIOs to work in close collaboration with their C-suite counterparts to innovate corporate business models and processes using disruptive technologies to transform how work gets done. As we move swiftly into 2014, what are the top considerations for CIOs in terms of embarking upon their digital transformation agendas? Does the mission just require the powerful elements of the disruptive trends, and a strategy for leveraging their combination, or will it require more? How does one begin the digital transformation process and where’s the best place to start?


Non-functional Requirements in Architectural Decision Making
In software engineering, a tight relationship exists between nonfunctional requirements (NFRs) and software architectures (SAs). As early as 1994, Rick Kazman and Len Bass asserted that SA is intimately connected to NFR achievement. This idea has pervaded software development over the years and explains why development projects invest a lot into fulfilling NFRs. This general statement becomes more concrete when we consider how the concept of SA has evolved from a simple structural representation to a decision-centric viewpoint.



Quote for the day:

"A business of high principle attracts high-caliber people more easily, thereby gaining a basic competitive and profit edge." -- Marvin Bower

January 17, 2014

Cooling Strategies for Ultra-High Density Racks
The simple answer to this problem would be to provision a data center so that it is capable of providing 20kW of redundant power and cooling to every enclosure. Unfortunately, this is simply not technically feasible or economically practical in almost any case. Making the wrong choices when specifying a data center for high density operation can needlessly increase the lifetime cost of the physical infrastructure by many times. The purpose of this paper is to outline practical and effective strategies for deployment of high density enclosures and blade servers.


Google unveils 'smart contact lens' to measure glucose levels
It uses a "tiny" wireless chip and a "miniaturised" glucose sensor embedded between two layers of lens material. The firm said it is also working on integrating tiny LED lights that could light up to indicate that glucose levels have crossed certain thresholds. But it added that "a lot more work" needed to be done to get the technology ready for everyday use. "It's still early days for this technology, but we've completed multiple clinical research studies which are helping to refine our prototype," the firm said in a blogpost.


How Natural Language Processing Makes Our Lives Easier and Improves Your Business
Talking to computers still requires programming languages but the ultimate goal of NLP is “to do away with computer programming languages altogether. Instead of specialized languages such as Java or Ruby or C, there would only be “human.”” The better a computer is capable of understanding natural language, the more applications there will be, but already NLP offers a lot of possibilities to help grow your business, save money and stay ahead of your peers.


The Year Ahead According to Rackspace
There’s a tacit agreement that many traditional security solutions just aren’t cutting it in our ever changing world of technology innovation. The NSA revelations and general scaremongering does not drive the market away from outsourcing, or from US companies, it drives them into wanting to do more on security, demanding more for their providers. 2014 will see continued investment in new security technologies especially around encryption. This will undoubtedly result in better security in the cloud and address some of those lingering doubts around the security of cloud-based platforms and systems.


Predictive Analytics Can Boost Enterprise Performance
"Using historical measures to gauge business and process performance is a thing of the past," said Samantha Searle, research analyst at Gartner. "To prevail in challenging market conditions, businesses need predictive metrics — also known as "leading indicators" — rather than just historical metrics (aka "lagging indicators")." Predictive risk metrics are particularly important for mitigating and even preventing the impact of disruptive events on profitability.


What makes innovation go wrong
Stephen Di Biase says innovation is "in our DNA. We evolved to get here." Di Biase, a longtime R&D executive, is now president of Premier Insights LLC, which provides consulting services about innovation to science-and-technology-based companies. He is on the advisory board of Clean Energy Trust, and he convenes a Chicago-area network of chief technology officers from companies that range from family-held firms to Fortune 500 companies. He spoke with Blue Sky Innovation about leadership, innovation in larger companies and thoughts for managers to consider when looking for new solutions.


IT mobility trend continues in 2014
It's pretty easy to conceptualize any software component as a resource, an element that does something for us. The problem with that very general approach is that it can lead to over-specifying. If you want to expose the functions of a programmable light switch, it's tempting to have verbs like On and Off and maybe status verbs like ReadState. These are nice, but they force an API into being not only functionally specific, but also limited in terms of what technologies can be used to implement it.


Web steps closer to baking-in support for NFC payments and data swapping
When implemented the spec would allow web pages and apps to read and write to NFC tags; to send and receive messages between NFC-enabled devices and provide a way to initiate a wireless connection via wifi or Bluetooth. The API would enable a range of capabilities for web sites and apps such as tapping two devices together to initiate a two player game; tapping devices to share data such as coupons or contacts; and tapping a device to read a message from an NFC tag.


Better software testing and improved quality starts with the culture
A testing expert who really knows his stuff adds enormous value to the project for the customer—and for the whole team by making their job easier rather than harder. Sadly, too many companies still view testing as more of a necessary evil than an opportunity. That's an attitude that Jim Holmes, Director of Engineering for Test Studio at Telerik, is doing everything he can to change.


Spy agencies around the world use radio signals to tap data from targeted systems
The technology, which has to be physically installed in most cases, has been available since at least 2008. It "relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers," according to the Times report. Data captured by the devices are sent to small briefcase-sized relay stations often set up miles away from the target system. The software has apparently allowed the NSA to do an end-run around whatever cybersecurity controls are installed on the compromised systems.



Quote for the day:

"Success is determined by those whom prove the impossible, possible." -- James W. Pence

January 16, 2014

How to make an HTML5 developer smile: A Google Web Designer wish list
Of course, exactly what Google Web Designer will be when it is released is still a mystery. At it's core, Google is a company that is interested in advertising dollars, and every project they promote has padding the bottom lineas the primary, if not sometimes obfuscated, directive. Despite what the development community might be wishing for in a new web design studio from Mountain View, Google Web Designer may be nothing more than a cross-platform plugin that simply makes it easier to drop DoubleClick ads into Android and iPhone applications


The 26 UX Axioms
The set of UX axioms has gone through an evolution over the last year as we iterated through the concepts, refined and combined ideas. We started with 150 concepts and ideas that were combined and synthesized into an initial set of 50 axioms presented to IxDA Grand Rapids in Nov 2012. Over the course of 2013, Erik presented the UX Axioms several times and further synthesized the set down to 21 Axioms. We recently added a few more axioms to the set we felt were missing. The current set stands at 26 UX axioms.


When did Passion for Your Work Become Passé?
Is it out of style to be vocal about your passion for your work, your profession or your firm? Perhaps. At least when it comes to articulating how excited you are to be doing what you are doing, it’s better to show than tell. And while the use of the term may generate a bit of a cringe factor for a variety of reasons, including the suspicion that someone is making it up, showcasing your passion for your work never goes out of style!


Reaping The Benefits Of Diversity For Modern Business Innovation
Diversity is critical for organization’s ability to innovate and adapt in a fast-changing environment. Some of the most successful entrepreneurs and most admired leaders will tell you the same thing. Diversity is essential to growth and prosperity of any company: diversity of perspectives, experiences, cultures, genders, and age. Why? Because diversity breeds innovation. And innovation breeds business success. Don’t believe me? Take a look:


Google stages coup against Windows 8 with Chrome OS-like update for 'Metro'
Google has made no secret of its push to subvert devices running rivals' operating systems and turn them into pseudo Chromebooks by shifting features from Chrome OS to Chrome the browser. A year ago, for example, Google started baking parts of QuickOffice, a popular iOS and Android app substitute for Microsoft Office, into both Chrome OS and the Chrome browser. Analysts have viewed the strategy as part and parcel of Google's desire to insert itself and its core services -- search, mapping, email and others -- onto as many systems, both PCs and mobile devices, as possible to optimize traffic and associated ad revenue.


Our CIO Is Leaving — Now What?
Confronting CIO succession in this competitive environment is rarely easy. Approaching the problem strategically and systematically helps identify priorities, issues to be mitigated and options that may not have been readily apparent at the outset. Furthermore, such an approach maximizes the chances that the widest pool of appropriate candidates will be considered and that once a candidate is chosen, he or she will be able to meet and surpass the expectations of the CEO and the board.


Data visualization tools may be glamorous, but focus on business value
Data visualizations are about more than just how pretty the information looks, according to Cindi Howson, founder of BI Scorecard. At their best, visualizations help users retain information and make better-informed decisions. Graphic displays can be understood much more quickly than simple data dumps, and well-designed visualizations do this even better, enabling collaborative data discovery.


Massive denial-of-service attacks pick up steam, new nefarious techniques
Today, Prolexic issued its quarterly global DDoS attack report, noting that even Android-based mobile devices are being spotted as instruments to launch DDoS attacks. In the report, Prolexic says its response team “uncovered evidence of the use of mobile applications launching DDoS attacks against enterprise clients, including one of the world’s largest financial firms.” Prolexic says signatures matching AnDOSid, a DDoS attack tool for Android devices, were observed in DDoS attack campaigns.


18 great uses for an old Android device
As we move multiple generations into mobile technology, more and more of us are building up collections of old, dated devices. And more often than not, those devices do little more than take up space and gather dust. Here's a little secret, though: Your abandoned Android gadgets are actually virtual gold mines. You just have to find the right way to tap into their potential and give them new life. So grab the nearest DustBuster and get ready: Here are 18 ways to make your old phone or tablet useful again.


Discover and Diagnose Java Concurrency Problems Using Contemplate's ThreadSafe
Contemplate's ThreadSafe Solo is a commercial static analysis plugin for Eclipse, designed specifically to discover and help diagnose difficult concurrency bugs lurking within Java programs. By being focussed on concurrency bugs, ThreadSafe can find bugs that other static analysis tools, both commercial and freely available, often miss or are not designed to look for. As far as we have been able to determine, none of the defects in the examples below are caught by any other Java static analysis tool.



Quote for the day:

"Education is more than a luxury; it is a responsibility that society owes to itself." -- Robin Cook

January 15, 2014

Continuous security monitoring: What enterprises can learn from CDM
With the CDM program, DHS is focusing on getting agencies to implement a six-step CSM process: installing and updating network scanning sensors, automating the search for known system flaws, collecting the scanning results, triaging and analyzing the results, initiating mitigation of the biggest or worst flaws, and reporting progress. The objective is to enable civilian agencies to fully diagnose their networks within 72 hours of sensor deployment.


Computer science: The learning machines
With triumphs in hand for image and speech recognition, there is now increasing interest in applying deep learning to natural-language understanding — comprehending human discourse well enough to rephrase or answer questions, for example — and to translation from one language to another. Again, these are currently done using hand-coded rules and statistical analysis of known text. The state-of-the-art of such techniques can be seen in software such as Google Translate, which can produce results that are comprehensible (if sometimes comical) but nowhere near as good as a smooth human translation.


Why Cognition-as-a-Service is the next operating system battlefield
CaaS will enable every app to become as smart as Siri in its own niche. CaaS powered apps will be able to think and interact with consumers like intelligent virtual assistants — they will be “cognitive apps.” You will be able to converse with cognitive apps, ask them questions, give them commands — and they will be able to help you complete tasks and manage your work more efficiently. For example your calendar will become a cognitive app — it will be able to intelligently interact with you to help you manage your time and scheduling like a personal assistant would — but the actual artificial intelligence that powers it will come from a third-party cloud based cognitive platform.


Geraldine Hamilton: Body parts on a chip
It's relatively easy to imagine a new medicine, a better cure for some disease. The hard part, though, is testing it, and that can delay promising new cures for years. In this well-explained talk, Geraldine Hamilton shows how her lab creates organs and body parts on a chip, simple structures with all the pieces essential to testing new medications -- even custom cures for one specific person. TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes (or less)


Why you should care about Net neutrality (FAQ)
The basis for the Net neutrality regulation that the FCC implemented is predicated on a centuries-old legal concept known as "common carriage." This concept of "common carriage" has been used not just to regulate telecommunications but other industries as well. It was developed to ensure that the public retained access to fundamental services that use public rights of way. In the case of the Internet, it means that the infrastructure used to deliver Web pages, video, and audio-streaming services, and all kinds of other Internet content, should be open to anyone accessing or delivering that content.


The future of shopping: When psychology and emotion meet analytics
Welcome to the future of retail, which is quickly moving beyond somewhat silly questions about whether tablets will run on Android, iOS, or Windows, and becoming much more focused on actual applications and sales. The best part about the retail sector is that it combines four fun areas: Business, technology, and human behavior and psychology. Here's a brief tour of technologies that range in maturity from those that are implemented today to ones that'll take awhile to be adopted.


Financial malware focuses on hiding malicious traffic, localization
The battle between security professionals and cybercriminals has become a cat-and-mouse game in recent years, Baylor said, as Microsoft and other botnet trackers have had success taking down malware by targeting the command-and-control (C&C) infrastructure used to relay instructions to infected machines. Microsoft led a major operation against the Citadel malware in June 2013, and reportedly took down up to 88% of the Citadel botnets, though it has since rebounded.


Of Internet-connected Crock-pots, cars, smartwatches
The Crock-pot uses Belkin's WeMo technology to connect the slow cooker's IP address to the Internet through a home Wi-Fi router. The company also showed a Wi-Fi-ready Mr. Coffee automatic coffee maker. ... Users can control both devices over the Internet, to turn on the coffee or heat up Irish stew from pretty much anywhere in the world, just as can already be done with a Nest thermostat and other devices. The Wi-Fi capability allows an office manager to turn on the morning coffee pot in the break room before arriving or a catering firm to fire up the cooker at a remote location.


Fifth of enterprise BYOD projects doomed to fail by 2016, claims Gartner
“Whether via a formal BYOD programme, or just via devices coming in the back door and being configured to access corporate systems, the use of consumer technologies in the work environment presents a threat to IT control of endpoint computing resources,” said Dulaney. “Given the control that IT has exercised over personal computers by developing and deploying images to company-managed PCs, many IT organisations will implement strong controls for mobile devices.”


R, the Integration Language?
Integration with R now appears to be a sine qua non strategy for analytics tool vendors. I’m currently investigating KNIME, an open source “user-friendly graphical workbench for the cradle-to-grave analysis process: data access, data transformation, initial investigation, powerful predictive analytics, visualisation and reporting.” KNIME is architected as a visual workflow metaphor and has much the look of a data integration tool, with drag-and-drop node folders such as IO, Database, Data Manipulation, Mining, Reporting, Statistics, etc. An R node is easily added.



Quote for the day:

"Leadership is the wise use of power. Power is the capacity to translate intention into reality and sustain it." -- Warren G. Bennis

January 14, 2014

Enterprise master data management and big data: A well-matched pair?
"Applying MDM against raw, unstructured content is of questionable value," said Evan Levy, vice president of business consulting at analytics and data management software vendor SAS Institute Inc. "But distilling that content down to have some sort of meaning and then linking it to a specific customer -- that's where MDM can come into play." Companies are starting to see -- or picture, at least -- a connection between enterprise MDM and big data, according to survey results published in November 2012 by The Information Difference Ltd.


C++ String Toolkit (StrTk) Tokenizer
Tokenization in the context of string processing, is the method by which a sequence of elements are broken up or fragmented into sub-sequences called tokens. The indices in the original sequence that determine such breaks in the sequence are known as delimiters. There are two types of delimiters, normal or thin delimiters which are of length one element and thick delimiters which are of length two or more elements. Even though tokenization is primarily used in conjunction with strings, any sequence of types that can be iterated in a linear fashion can be tokenized, examples may be list of integers, a vector of person classes or a map of strings.


Scaling Storage Is Hard To Do
How do you add capacity and performance without drastically re-architecting storage systems? For the last decade, enterprise storage vendors have relied on clustering as a means to scale. Each clustered controller is locked in a “mind meld” with every other, sharing precious data maps and caches in real time, enabling customers to add whole arrays for greater capacity and performance.


Bridging Big Data and the Personal Data Ecosystem Through Privacy by Design
In order to make the interactions between Big Data and individuals more sustainable—in other words, to effectively transform this “new oil” into a renewable resource—the concept of the personal data ecosystem (PDE) has been proposed.4 The PDE is the emerging landscape of companies and organizations that believe individuals should be in control of their personal information and directly benefit from its use, making available a growing number of tools and technologies to enable such control.


Intel Announces Death of McAfee Brand. Will it be That Simple?
The decision is not entirely unexpected despite the fact that it has taken Intel longer than normal after the acquisition to resolve to drop what remains one of the two or three most famous security brands in existence. Intel is banking that attaching its own brand to the word 'security' will more than offset any loss in recognition. McAfee cost Intel $7.68 billion (at the time around APS5 billion) in August 2010, still a record price for a pure security firm so it might feel it has the right to impose its own identity.


Defining Responsiveness
When people say that something is responsive, what do they mean? I’m not being facetious. I think many of us think we know what is meant, but when you dig deeper, there is disagreement about what it means for something to be responsive. ... So by definition, Google Plus is not a responsive web design. It may look like one, but it doesn’t contain the three technical pieces necessary to be a responsive web design.


Considerations for Data Center Owners When Partnering With Modular Builders
Modular data center companies appear in all forms, from modularity at rack levels to modularity at building levels to modularity at infrastructure levels. A data center owner needs first to decide at what level they would like to engage in modular deployment. If the path chosen is a fully modular data center, it becomes significantly more important to engage your potential partner at the very early stages of concept and design.


Don't panic: The Internet is not collapsing, despite a spike in global 'attack' traffic
The Internet isn't about to collapse or crumble, despite two long threads on popular technology site Hacker News and news-sharing site Reddit suggesting (in some cases) that it might. Pointing to Akamai's Real-time Web Monitor, which tracks "global Internet conditions around the clock," many drew concern from the meter showing that attacks were — at the time — up as much as 98 percent. At the time of writing, the meter showed attacks were up by close to 107 percent above normal.


All About TransactionScope
In the real world any one you will find exceptional scenarios, exceptional issues where only a knowledge of how to useTransactionScope is not good enough. To resolve transactional issues like deadlocks, timeouts, etc., you must know each and every concept directly/indirectly related to a transaction. There is no alternative. So the concepts of a transaction and its related components need to be clear.


Intelligent Evolution: Making Change Work
When these organizations try to change, they frequently fail because we forget that they are complete creatures and need to be changed in depth. Trying to improve the practices of the engineering department without paying attention to the rest of the organization is similar to trying to change an organ within a body without understanding the impact on the rest of the body. Imagine that a surgeon performs a liver transplant without considering whether there is a potential difference between the livers of different people. We would have a high probability of organ rejection and potentially death of the patient.



Quote for the day:

"Everything I've ever done was out of fear of being mediocre." -- Chet Atkins