October 20, 2014

Is your Ethernet fast enough? Four new speeds are in the works
Work is also beginning on a 50Gbps specification, which could be the next speed offered for linking servers in data centers. Both servers and high-performance flash storage systems will drive a need for something more than 25Gbps in the biggest data centers in a few years, Weckel of Dell’Oro said. At Thursday’s event, attendees debated whether to seek a 50Gbps standard or go all the way to a single-lane system for 100Gbps. A 50Gbps specification is more within reach, said Chris Cole, director of transceiver engineering at Finisar.


How Microsoft's expected fitness band fits into its new wearables game plan
It's the Microsoft side of the wearables equation that interests me the most, however. I'm expecting the coming fitness band to have a Windows core inside the device, given Microsoft execs' insistence that Windows 10 will run "everywhere," meaning from the smallest Internet of Things devices, to datacenter servers. The Operating Systems Group team at Microsoft is building a common set of graphics, gaming and media consumption/creation services that will work on PCs, tablets, phones, Xbox consoles and wearables. .


Q&A with Futurist Martine Rothblatt
The data for evolution is so compelling that to deny it seems to me to be denying reality. Evolution is either a consequence of a material world or it’s the result of some kind of supernatural act. To me, it’s the same thing with consciousness. Either you think that consciousness is something metaphysical, or else it’s the result of physical interactions of matter. It’s because people’s brains have a series of connections, of atomic interactions, and computers could have that. To me, to deny cyber-consciousness is to deny we live in a physical universe.


Internet Of Things Will Turn Networks Inside-Out
The point where these two networks connect -- the "come hither" enablers of IoT and our current, manicured data center plumbing -- is going to be a bit like that creepy scene in Spielberg's A.I. Artificial Intelligence, where Gigolo Joe is explaining to a wide-eyed 10-year-old David what he does for a living. Neither had a clue what the other's world was really like, and fortunately neither David nor data center admins really need Joe's icky details. However, the firewalls between these networks will need something entirely new, something that Software-Defined Networking only begins to offer: intelligence.


Sacrificial Architecture
Knowing your architecture is sacrificial doesn't mean abandoning the internal quality of the software. Usually sacrificing internal quality will bite you more rapidly than the replacement time, unless you're already working on retiring the code base. Good modularity is a vital part of a healthy code base, and modularity is usually a big help when replacing a system. Indeed one of the best things to do with an early version of a system is to explore what the best modular structure should be so that you can build on that knowledge for the replacement. While it can be reasonable to sacrifice an entire system in its early days, as a system grows it's more effective to sacrifice individual modules - which you can only do if you have good module boundaries.


Big Data for Finance – Security and Regulatory Compliance Considerations
Many of the traditional point security solutions that are deployed add complexity and management costs, and leave gaps between systems and applications that are highly vulnerable to attack. The increasingly global nature of the financial services industry makes it necessary to comprehensively address international data security and privacy regulations. Financial institutions are top targets of cybercrime. While all types of businesses are vulnerable to attacks by criminals, it’s the security breaches at financial firms that elicit the most media attention, public scrutiny and legislator consternation. When threats occur, it’s more than financial loss at stake.


Oracle v. Google at the Supreme Court: Industry Watchers Weigh In
"If Google wins, the status quo prevails; if Oracle wins, then Google will either have to strip out Oracle-patented IP or pay Oracle for the right to use its IP," he said. "In the latter case, Google will 'own a piece of Android,' a nice position given that Java ME is a nonstarter among smartphone and tablet OSs." Martijn Verburg, CEO of jClarity, a startup focused on automating optimization for Java and JVM-related technologies, and co-leader of the London Java Users' Group, is also sanguine about the effect of the rulings on the Java community so far.


How Microsoft is taking on the cross-platform challenge with Office
With a common C++ core, a thin native UX layer and evolving PALs, Microsoft is building its Office apps so they work on different OSes with fairly little tweaking required. Zaika cited PowerPoint as an example, noting that only four percent of its tens of millions of lines are unique to the WinRT/Universal version of Office (the touch-first Office release some of us have been calling "Gemini"). If the XAML code is excluded, the amount of shared code is 98.6 percent he said. The PowerPoint for Android code base includes 95 percent shared code, Zaika said.


Jonas Bonér on Reactive Systems Anti-Patterns
A Reactive approach is able to first isolate and contain the error to avoid it from spreading out of control—which can lead to cascading failures, taking down the whole application—and instead capture it at its root allowing fine-grained failure management and self-healing. Second, it allows you to reify the error as a message and send it to the best suitable receiver—the component best suitable for managing the failure (usually called the component’s Supervisor)—not just right back to the user of the service. Now, if the error is just an ordinary message then it can be managed just like any other message; sent asynchronously, to one or many listeners, even across the network for full resilience.


James Comey, F.B.I. Director, Hints at Action as Cellphone Data Is Locked
But F.B.I. agents see the encryption as a beachhead they cannot afford to lose. With the latest software, the new phones will be the first widely used consumer products to encrypt data by default. If that is allowed to stand, investigators fear other technology companies will follow suit. If all desktop computers and laptops were encrypted, it would stymie all kinds of criminal investigations, they say. Mr. Comey’s position has set up a potentially difficult struggle between law enforcement agencies and the nation’s high-technology manufacturers, who have rebuffed the government’s demands for a way to decode data.



Quote for the day:

“The right thing to do and the hard thing to do are usually the same.” -- Steve Maraboli

October 19, 2014

Services and Enterprise Canvas review – 3C: Validation
In practice – as can be seen in part via that list above – it’s often the case that each value and validation-service is supported by a relatively small core-team whose job it is to ‘hold the flag’ for the respective value. Also in practice, each of these core-teams would (or should) typically report direct to the organisation’s senior-executives – because in most cases, it’s that executive board who are formally liable and accountable for compliance to the respective laws, regulations and standards around that respective value.


A Big Data Strategy — A CIO Survival Tool for Today’s Organization
Even if data is useful today, it may not be useful in a month, or six months, or a year. So whenever data is stored within your system, whether on-premises or in the cloud, that data should have an end-of-life date. Yes, in some cases that date will be never, but there’s relatively little data most organizations need to preserve for all time. Any data that doesn’t meet that standard should sunset at a pre-determined time. Ideally, this should happen automatically, without further action from you or your staff.


PaaS is the Operating System
When looking at container-based PaaS offerings, such as CloudFoundry and Heroku, one can see many of these functions in operation across a set of virtual compute resources. If we consider that Infrastructure-as-a-Service (IaaS), bare metal and virtualized hardware inclusive of traditional operating systems, such as Windows and Linux, all represent the modern day equivalent of a compute node in a cloud universe then we can take the leap that the PaaS provides the interface between the user and that node.


Intelligent Transportation Systems Require Intelligent Mobile Networks
Cisco also showed how Connected Transportation solutions can leverage the intelligent – and virtualized – mobile core network. We demonstrated a [fictional] after-market connected car application (“CarConcierge”) that enables users to remotely start or unlock their car, do a car “health check,” and extract car-sourced analytics over an LTE mobile network. The demonstration showed how the Connected Transportation market will see an explosion of innovative new applications that mobile operators can monetize by providing secure, intelligent, and cost-effective connectivity and process automation to devices and vehicles.


How to define the ISMS scope
You can draw your processes that are included in your ISMS scope, and then outside of this circle draw the processes that are provided from outside of your scope. By processes, I don’t mean only security or IT processes – I mean the main business processes within your scope; ... Once you know the dependencies, you have to identify the interfaces. They are important for a company to understand its ISMS boundaries, and to understand which inputs and outputs will be going through these interfaces in order to protect them better.


Why R is Better Than Excel for Fantasy Football (and most other) Data Analysis
Many articles have been written on why R is better than Excel for data analysis. In this post, I will summarize the reasons why R is advantageous in most data analysis circumstances, with a focus on fantasy football analysis. Although this post focuses on the benefits of using R for fantasy football analysis, the benefits of R extend to many other domains (e.g., finance, time series, machine learning, social sciences; for a list of different domains of R packages, see here).


Calling Dr. Algorithm
The race to develop a working tricorder is just one small aspect of a much larger movement to integrate advanced technologies into the process of delivering healthcare. Although many other fields have been massively disrupted by new technology in the past several decades, healthcare has been relatively immune to change. Unfortunately, the U.S. healthcare system (despite claims that “it is the best in the world”) has serious problems: Although U.S. per capita healthcare costs are the highest of any country in the world, the U.S. lags behind many other countries in terms of key health indicators like longevity and infant mortality.


Preparing Your Enterprise for Big Data
Big data involves the acquisition, transformation, and storage of large volumes of data and its subsequent analysis. To do this, most organizations acquire one or more ready-made solutions from vendors. A popular choice is the IBM DB2 Analytics Accelerator (IDAA), a hybrid hardware and software solution from IBM. This hardware (sometimes called an appliance) includes a multiple terabyte disk storage array in a special-purpose hardware chassis, as well as high-speed networking cables to transfer data from enterprise storage. Once the data is stored in the appliance it can be accessed as if it were a database.


Why Enterprise Architecture?
Enterprise Architecture (EA) is no longer a tool or process only exercised by the IT department to capture a static image of the IT infrastructure. EA has climbed the corporate ladder and now resides with upper management as a decision support tool translating business vision and strategy into effective enterprise change. By incorporating and integrating Project Portfolio Management (PPM), Enterprise Risk Management (ERM), and executive leadership’s vision, EA now takes a risk based approach to help organizations achieve mission goals and accomplish business objectives by selecting, controlling and evaluating projects to determine the best mix of projects and the right level of investment to make in each.


The State of Practice in Model-Driven Engineering
The study reflects a wide range of maturity levels with MDE: questionnaire respondents were equally split among those in early exploration phases, those carrying out their fi rst MDE project, and those with many years’ experience with MDE. Interviewees were typically very experienced with MDE. We discovered several surprises about the way that MDE is being used in industry, and we learned a lot about how companies can tip the odds in their favor when adopting it. Many of the lessons point to the fact that social and organizational factors are at least as important in determining success as technical ones. We describe elsewhere the gory details of the research approach.



Quote for the day:

"A leader should demonstrate his thoughts and opinions through his actions, not through his words." -- Jack Weatherford

October 18, 2014

Bionym's wearable authentication device ships to developers
A wearable authentication device, which communicates with devices and apps via Bluetooth, could get around that issue. "Passwords, which we still use today, are yesterday's answer to security," Jeff Kagan, an independent analyst, said in a previous interview. "We need new technology going forward. This sounds like an interesting company trying to solve a growing problem that we're all experiencing." That means the wearable could give users the convenience of being able to move about their day without remembering passwords or carrying keys, a credit card or ID.


The Emergence of the Third Platform
The successful implementation and deployment of enterprise SoR has been embodied in best practices, methods, frameworks, and techniques that have been distilled into enterprise architecture. The same level of rigor and pattern-based best practices will be required to ensure the success of solutions based on Third Platform technologies. Enterprise architecture methods and models need to evolve to include guidance, governance, and design patterns for implementing business solutions that span the different classes of system. The Third Platform builds upon many of the concepts that originated with Service-Oriented Architecture (SOA) and dominated the closing stanza of the period dominated by the Second Platform technologies.


Press Start to Learn: How Gamification Is Changing Education
One essential element of gaming being utilized is that of visual progression. Students and gamers like to see their progress, whether it be with a level-up bar slowly being filled or actual cosmetic changes on the player’s avatar. They like knowing all the work they’re doing is having a more immediate result instead of waiting for a report card many months down the line. Some classrooms are using the idea of acquired points as a reward for students. That visible progress is an outward sign of how well they are doing.


Best Practices in Mobile Business Intelligence
Enterprise-wide integration of mobile business intelligence has many benefits for organizations, including increased workforce productivity, the ability to collaborate anytime and anywhere, and improved customer satisfaction. However, there are a number of hurdles to overcome: convincing your organization to deploy the infrastructure that is necessary for mobile security, understanding mobile versus desktop report development, incorporating the concept of bring-your-own-device (BYOD), and garnering support for utilizing a mobile device to analyze critical decision-making data.


Cloud computing terms defined in new ISO standard
"A public cloud may be owned, managed, and operated by a business, academic, or government organisation, or some combination of them. It exists on the premises of the cloud service provider," it said. "Actual availability for specific cloud service customers may be subject to jurisdictional regulations. Public clouds have very broad boundaries, where cloud service customer access to public cloud services has few, if any, restrictions." The private cloud, in contrast, is "where cloud services are used exclusively by a single cloud service customer and resources are controlled by that cloud service customer".


The Contrarian’s Guide to Changing the World
It’s less clear whether his ideas have much to offer the rest of us. Thiel has been asking a huge question for a few years now: How can we avoid a dismal future of resource depletion, environmental degradation, mass unemployment, and technological stagnation? He thinks the answer is a new wave of startups that grow as large as Microsoft, Google, and Amazon but take on bigger problems, such as curing cancer or providing cheap, clean energy. He claims we aren’t making progress on such things now because we’ve grown less ambitious as a society.


BCBS 239 – What Are Banks Talking About?
BCBS 239 set out 14 key principles requiring banks aggregate their risk data to allow banking regulators to avoid another 2008 crisis, with a deadline of Jan 1, 2016. Earlier this year, the Basel Committee on Banking Supervision released the findings from a self-assessment from the Globally Systemically Important Banks (GISB’s) in their readiness to 11 out of the 14 principles related to BCBS 239.  Given all of the investments made by the banking industry to improve data management and governance practices to improve ongoing risk measurement and management,


Silicon Valley's next disruption: Reality!
Microsoft Research is working on a patented technology that uses projectors to display game play onto the walls, ceiling and floor of a room. The basic application is that you play some future Xbox game. As is the case today, the main game play happens on a TV screen. Let's say you're playing a first-person shooter in a tropical jungle. IllumiRoom would project the rest of the jungle all over the room -- creating peripheral vision to the focused play on screen. This again challenges the notion of virtual reality. The room is real, but the jungle is virtual and computer-generated.


Data-Driven Business Processes Essential for Optimization
The information management issues in process design and execution are similar to those at work for analytics. However, addressing them effectively requires a different approach than just creating a separate data store to be the “single version of the truth.” Careful consideration is required to determine the best method to manage data throughout a core business process, particularly when multiple applications are required to automate and support the execution of the process. Software application platforms offered by some vendors make it far easier to integrate niche software applications into processes in a way that may eliminate the need for an operational data store.


Cloud Automation in a Windows World
There are a couple different perspectives one can take to stack up today’s Windows automation landscape. One is to compare the state of Windows automation as it stands today with its state five years ago. This might lead one to feel impressed with how much the technology has grown and you may look optimistically to the future. The other perspective is to compare today’s Windows automation ecosystem with the tooling that surrounds Linux based infrastructures. At first glance things may not look so different but the closer you look and the more you tinker, you become aware of the fact that there is an undeniable gap in maturity.



Quote for the day:

"Not everything that counts can be counted, and not everything that can be counted counts." -- Albert Einstein

October 17, 2014

Six browser plug-ins that protect your privacy
There's one other consideration, and that's the funding behind the blocker. While most of the apps that I looked at are free or open-source, supported exclusively by donations, at least one, DoNotTrackMe, employs a freemium model (charging a subscription fee if you want advanced features), while Ghostery asks you to provide usage data. Of the six tools reviewed here, only Adblock Plus has an "acceptable ads" feature that allows advertising from Google and other paying companies, and it's turned on by default. But you can easily disable it if you want a totally ad-free experience.


The anatomy and physiology of APT attacks
Nothing in our past has happened so quickly or with as far-reaching implications and dependencies. Critical networks, utilities and other infrastructures are all intertwined with the networks of companies and governments. Almost everything that's built, designed and manufactured is on the Internet. If the Internet stopped working, the global economy would collapse. With that dependency comes issues of national security. Governments have recognized the strategic and tactical advantage of having both defensive and offensive capabilities in the electromagnetic arena.


New technique allows attackers to hide stealthy Android malware in images
In the researchers’ demonstration, the APK hidden inside the image was designed to display a picture of Darth Vader, but a real attacker could use a malicious application instead to steal text messages, photos, contacts, or other data. During the demonstration, Android displayed a permission request when the wrapper application tried to install the decrypted APK file, but this can be bypassed using a method called DexClassLoader so that the user doesn’t see anything, Apvrille said. The image wouldn’t even have to be included in the wrapper application and could be downloaded from a remote server after installation, she said.


Putting the R in the Open Source Revolution
With big data, of course, comes big data analytics. R is the statistical and data science programming language of choice. It is capable of solving complex statistical problems, applying machine learning techniques and creating very rich data visualizations, and it doesn’t care how big the data is. As an open source language, R has seen its share of development and distributions. Its thriving user community has been steadily creating packages to perform specialized techniques and reporting tools. R is perceived by some as being far more flexible and extensible than its legacy counterparts, namely SPSS and SAS. And the college kids are learning it, so it must be cool.


Isolationism, Globalization and the Role of the Colocation Provider
The UK Data Protection Act’s eighth principle states that “personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.” When you read the interpretation of the principle, it suggests that a colocation provider could be subject to “the law in force in the country or territory in question.” Does this mean that despite many colocation providers not knowing what is on a client’s server, they could be unwittingly contravening an international law and in doing so also contravening the UK Data Protection Act?


10 areas of IT risk you could be overlooking
CIOs spend hours reviewing risk management. Prominent areas of concern include disaster recovery, data breaches, and the financial viability of certain technology strategies. But there are a number of less obvious issues that IT typically overlooks -- and the negative consequences of doing so can be significant. Here are some of those under-the-radar risks.


Intel preps new technology to secure credit card transactions
"We need to make sure retailers have the tools they need to collect data from the end point and hold onto it securely," Corrion said. Consumers are also using new forms of payment, including Google Wallet and Apple Pay, which use NFC (Near Field Communication). Intel's technology can protect NFC transactions, and can create a secure layer so payment data is securely transmitted. The Intel system handles every step of a transaction, making it easier for retailers to deploy, Corrion said. Other systems use separate payment peripherals and encryption technologies, which are difficult to manage centrally, he said.


Continuous monitoring demystified
Even though continuous monitoring has been a part of the information security lexicon for several years now, many security professionals are still wondering how to get started: What technologies typically make up continuous monitoring infrastructure? What steps should you take to successfully implement these types of security controls organization-wide? Before implementing a model with specific technologies, you and your team should set high-level goals and plan to achieve the following objectives with your continuous monitoring approach:


Living With 1990 Tech for a Day – Part 1
Since my music collection is in digital form, I have no choice but to rely on the radio. Here I'm in luck. Large swathes of the New Zealand population are conservative in their musical tastes: they like what they know and they know what they like. Within moments, Fleetwood Mac's Seven Wonders drifts over the airwaves, Stevie Nicks' dulcet tones providing the perfect backdrop to my retro computing experience. Then doubt strikes me as I seem to recall that the song was from the late 80s, not 1990. The doubt vanishes when I realise that without the internet I have no easy way to check.


Why SOA Should Be Viewed As “Dependency-Oriented Thinking”
If you had to reduce the principles of SOA to one practical rule of thumb for designers, what would it be? I’m willing to bet it will be “Avoid point-to-point connections”. That’s the rule of thumb I’ve heard dozens of SOA experts provide as advice at more than a few organizations I’ve worked for. On the face of it, that sounds like perfectly reasonable advice, because everyone knows that point-to-point connections cause rigidity and brittleness, and SOA is all about flexibility and agility, right?



Quote for the day:

"One measure of leadership is the caliber of people who choose to follow you." -- Dennis A. Peer

October 16, 2014

McAfee highlights security challenges of a next-generation government
“The fundamental nature of the threat is unlikely to change as governments move towards the next-generation," said the report. "On one hand, new technology could reduce the number of human ‘entry points’ into the system. On the other, the human element that remained would be that most critical to the system’s operations. This could mean the impact of a breach would be more significant than in a situation with multiple users with more limited responsibilities.”


Researcher builds system to protect against malicious insiders
"Insider threats are many times the most devastating, as they are the least expected," said Patrick Moorhead, an analyst with Moor Insights & Strategy. "Companies spend most of their security time and money guarding against external threats.... So that sometimes leaves the inside exposed." To combat this, Yao is combining big data, analytics and security to design algorithms that focus on linking human activities with network actions. Typical computer systems monitor things like network traffic, file system events and email activities. They also focus on looking for specific warning signs, like someone uploading large amounts of data.


Top 10 IT trends that rattle data center I&O
Whether it's software-defined networking, storage or data centers, software-based tools that connect computing resources and components are dispensing with traditional physical devices hard-wired or hand-configured across the data center. Software-defined anything concentrates management in a single place or tool, either on- or off-premises. These technologies also share a common goal of enhancing workload mobility and traffic flow based on logical rules, allowing workloads to be provisioned and run where they are most effective or efficient.


Google's big Android Lollipop challenge: Make Material Design stick
Google has rolled out its Nexus 9 tablet, Nexus 6 phone and Nexus Player streaming device all in a bid to show off the latest version of Android, known as Lollipop, and the glue between the screens will be a something the search giant calls Material Design. Like Apple, Microsoft and Amazon, Google is on a mission to tie its various devices together and adapt content and tasks to multiple screens. Windows 10 will be all about the multiple screens. Apple's iOS 8 melds tablets and smartphones and increasingly blends in with the Mac OS too with matching design metaphors.


Startup builds on Wi-Fi chips for cheaper 'last mile' to home broadband
The Mimosa gear uses that protocol along with beam-forming features to point radio signals at individual homes. That lets it cover a whole neighborhood with transmitters placed one per kilometer or so, Fink said. In a typical setting, such a network could offer service of about 500Mbps (bits per second) both down to subscribers and back up to the Internet, he said. Mimosa has met with service providers in the U.S. and other countries and expects networks built with its technology to launch in the middle of next year. Mimosa's system uses the same unlicensed 5GHz band as Wi-Fi for the main connections between access points and homes.


How to match cloud integration tools to business needs
It really has to do with the intensity, if you will, of the integration task that is being overcome when an organization is deploying a variety of cloud [or] SaaS solutions. And in some cases, a simple API may be all that's necessary. But in many cases, especially when it comes to a couple of these who are using enterprise-class business applications across their organization and in tandem with legacy on-premises applications and data sources, depending upon the use case and business process, there's going to be a need for varying kinds of cloud integration tools and connectors and, even in some cases, platforms to satisfy their needs.


Google adds security and flexibility to latest Android mobile OS
Security enhancements include the flexibility to secure devices with a PIN, password, pattern, or by pairing a smartphone with another trusted device like a watch. This feature – called Smart Lock – is aimed at encouraging users to set passwords by making it unnecessary to type in a password whenever the trusted device is detected. The encryption of all stored data is also now a default setting to help increase security by offering protection for data on lost or stolen Android devices. According to Google, security-enhanced Linux enforcing for all applications means even better protection against vulnerabilities and malware.


Security vendors claim progress against Chinese group that hacked Google
The hackers, referred to as "Hidden Lynx" by Symantec, are believed to have been behind "Operation Aurora," a famous cyberespionage campaign revealed in early 2010 that compromised as many as 20 companies. Google said the attack stole some of its intellectual property and also appeared to target the Gmail accountsof Chinese human rights activists. Google's comments fueled a growing diplomatic row between the U.S. and China over cybersecurity issues. Other U.S. companies followed Google in more directly blaming China for sophisticated long-term infiltration campaigns.


IT Hiring Trends Up, But Budget Trends Disappoint
The persistence of lower budgets seems to have finally impacted IT leaders’ confidence in their ability to satisfy business demands. Over the course of the year there has been a decline in those who expressed confidence (-3 percent) and those who were neutral (-4 percent) and an increase in those who were not confident (+7 percent). In addition to never receiving increased budgets in order to complete workloads, reasons for this decline in confidence could be attributed to the realization that time is running out to complete planned projects or that additional IT projects have been scheduled for the remainder of the year.


Forget the Internet, Brace for Skynet
Several important technology milestones need to be reached along the way. The drones that will make up Skynet have a lot more in common with satellites than the flippy-flappy helicopter drone thingies that the popular press is fixated on right now. They’re really effing BIG, for one thing. And, like satellites, they go up, and stay up, pretty much indefinitely. For that to happen, we need two things: lighter, higher-capacity wireless gear; and reliable, hyper-efficient solar tech. So some work still needs to be done on the physics of Skynet; but not that much work, and certainly not anything beyond the reach of hard-working American (or Chinese, or Chinese-American) engineering types.



Quote for the day:

"A leader is someone people respond to, trust and want to work with." -- @ShawnUpchurch