December 20, 2014

Roy Fielding on Versioning, Hypermedia, and REST
Anticipating change is one of the central themes of REST. It makes sense that experienced developers are going to think about all of the ways that their API might change in the future, and to think that versioning the interface is paving the way for those changes. That led to a never-ending debate about where and how to version the API. ... This is precisely the problem that REST is trying to solve: how to evolve a system gracefully without the need to break or replace already deployed components.


Buckle up IT: The enterprise needs you for cloud adoption
"When you're talking about applications and services that are important to the enterprise, it's crucial to have IT in the loop so that they can assess security, performance and availability risk factors," Olds said. "Sort of like having your doctor by your elbow at the buffet. It's not as satisfying, but you'll be healthier in the long run." Allan Krans, an analyst with Technology Business Research, noted that the days of companies having multiple silos of information and applications running without IT's involvement or knowledge should be coming to an end in the coming year.


Dear Enterprises: Now Is The Time To Get Freelance Work Right
The writing is on the wall. In 2015, enterprises MUST get it right when it comes to managing independent contractors. More companies than ever are turning to freelancers and independent contractors — especially large, billion-dollar enterprises who can capture significant business value from deploying a flexible, non-employee workforce. Since we first started Work Market in 2010, we’ve been helping enterprise companies navigate the nuances of independent work. Fast forward five years, and we’re seeing a greater number of enterprises turn to independent workers than ever before.


SQL Zip Compression, RegEx and Random Functions
While SQL Server natively supports storing data as compressed, with this library we are able to achieve goals that transcend any one application layer. ... The biggest advantage is that since the data is stored and delivered compressed, it is low impact on SQL (both Disk I/O and CPU) and the network to deliver the data to the client. This opposed to SQL native compression where SQL compresses on receive and decompresses on send, the network then recompresses while sending, then the client decompresses the network packet on receive.


Wouldn’t it be fun to build your own Google?
Imagine you had your own copy of the entire web, and you could do with it whatever you want. (Yes, it would be very expensive, but we’ll get to that later.) You could do automated analyses and surface the results to users. For example, you could collate the “best” articles (by some definition) written on many different subjects, no matter where on the web they are published. You could then create a tool which, whenever a user is reading something about one of those subjects, suggests further reading: perhaps deeper background information, or a contrasting viewpoint, or an argument on why the thing you’re reading is full of shit.


New Intel Platform Rich with Transformative Features
Many high-performance computing (HPC) users are familiar with Intel AVX 1.0, which increased floating point packet processing from 128 bit to 256 bit. Now Intel AVX2 doubles integer packet processing, from 128 bit to 256 bit. That essentially doubles your integer processing ability on the same clock speeds. This advance will drive new workload performance gains, particularly for the demanding HPC applications used in life sciences, physics, engineering, genomic research, data mining, and other types of compute-hungry scientific and industrial work. In our testing, we have seen up to a 1.9x increase in performance with Intel AVX2.[1],[2]


We Still Don’t Understand Very Well How Social Change Occurs in the Digital Age
he Internet is responsible for one of the paradoxes of the digital age. We are just a click away from having a friend in the antipodes, but we end up following friends who we already know from work, school or just around the corner. Ethan Zuckerman, director of the Center for Civic Media at MIT, denounces the lack of globalism on the web and alerts us to a few hazards that may cause damage to the democratic quality of our governments. Zuckerman proposes alternatives to the current model of Internet business and puts the magnifying glass on users in order to understand how social changes come about in the digital age.


Creating a Sales Dashboard with Bootstrap and ShieldUI
Although a complete Dashboard can include any possible combination of widgets and layout elements, I have picked the most widely used. From a layout perspective, the page is divided into responsive panels, the positioning of which is determined by the Bootstrap layout system. On smaller screens, each section is adequately positioned to occupy all of the available space. The widgets used are JQuery QR code, JQuery rating control, two different layouts for the graphs, utilizing a JQuery Chart plugin, a circular progress bar, and a grid. From a development perspective, I have used a simple html file, which hosts all the required code.


Artificial Skin That Senses, and Stretches, Like the Real Thing
Finally, in a further effort to make the materials seem more realistic, they added a layer of actuators that warm it up to roughly the same temperature as human skin. The new smart skin addresses just one part of the challenge in adding sensation to prosthetic devices. The larger problem is creating durable and robust connections to the human nervous system, so that the wearer can actually “feel” what’s being sensed. In a crude demonstration of such an interface, Dae-Hyeong Kim, who led the project at Seoul National University, connected the smart skin to a rat’s brain and was able to measure reactions in the animal’s sensory cortex to sensory input.


Alchemy: Message Buffer
One topic that has been glossed over up to this point is how is the memory going to be managed for messages that are passed around with Alchemy. The Alchemy message itself is a class object that holds a composited collection of Datum fields convenient for a user to access, just like a struct. Unfortunately, this format is not binary compatible or portable for message transfer on a network or storage to a file. We will need a strategy to manage memory buffers. We could go with something similar to the standard BSD socket API and require that the user simply manage the memory buffer. This path is unsatisfying to me for two reasons:



Quote for the day:

"Ignorance is a death sentence for any leader as it eliminates the option to take action effectively." -- @ManagersDairy

December 19, 2014

IT pros: Rethink before you replace
Rethink your solutions. Newer technologies sometimes offer simpler solutions than older apps. For example, Hangouts handles browser-based, multi-person meetings much easier than most legacy meeting apps. Similarly, Chromebox for Meetings offers an affordable, powerful alternative to traditional small office conferencing systems. Quip combines messaging, documents, and spreadsheet collaboration -- all in a single, easy-to-use app. The "default" choice from a legacy provider might now be matched by a clever combination of lower-priced hardware working with smarter software.


Not Just Code Monkeys
Martin Fowler keynotes on the importance of building a healthy social environment where software development can thrive. You can view here part 1 of this presentation ... Martin Fowler is an author, speaker, consultant and general loud-mouth on software development. He's the Chief Scientist at ThoughtWorks - an international application development company, and has written several books on software development and also writes articles regularly


Android Will Soon Be Baked Right Into Your Car
In its current form, Android Auto allows drivers to display Android apps and functionality on a vehicles dashboard screen by connecting it to a smartphone. By baking Android fully into the car, Google would be able to control not just the infotainment system but also have access to a car’s camera, GPS, diagnostics and telematics … everything piece of data that a car can provide about its driver. Google already can collect much of this data through Android smartphones, but Android Auto locks drivers into the Google and Android experience while eliminating the need for a smartphone running on a limited battery.


Big Dataclast: My Concerns about Dataclysm
Contrary to his disclaimers about Big Data hype, Rudder expresses some hype of his own. Social media Big Data opens the door to a “poetry…of understanding. We are at the cusp of momentous change in the study of human communication.” He believes that the words people write on these sites provide the best source of information to date about the state and nature of human communication. I believe, however, that this data source reveals less than Rudder’s optimistic assessment. I suspect that it mostly reveals what people tend to say and how they tend to communicate on these particular social media sites, which support specific purposes and tend to be influenced by technological limitations—some imposed (e.g., Twitter’s 140 character limit) and others a by-product of the input device


A Feminist Critique of Silicon Valley
Obviously the pipeline is a huge issue. But too often, our industry focuses on early stages of the pipeline that they have no control over. You see venture capitalists talk about the need to get more 10-year-old girls into programming, and that’s so far removed from their direct sphere of influence. Meanwhile, there is attrition in every stage of the career path of women once they get into the industry. Over 50 percent of women will leave by the halfway point in their careers. We are not getting hired, and we are not getting promoted, and we are being systematically driven out of the industry.


Microsoft files suit against alleged tech support scammers
It is a big problem. Since May 2014 alone, Microsoft has received over 65,000 customer complaints regarding fraudulent tech support scams. According to a survey issued by Microsoft, over one-third of U.S. citizens fall for the scams once contacted, causing them to suffer approximately $1.5 billion in financial losses each year. In an attempt to stop the scammers, Microsoft filed a civil lawsuit with the U.S. District Court for the Central District of California against a California company trading as Omnitech Support, and related companies, for unfair and deceptive business practices and trademark infringement, Microsoft said Thursday.


Cyber Attackers Increasingly Sneaking Corporate Data Out Through DNS
The technique is simple. Attackers encode data in base 64 and encapsulate the information within DNS requests, which are sent to an attacker-controlled server. The server then decodes the traffic and recovers the data. Generally, such techniques are considered tunneling if the communications channel can send data in either direction. DNS exfiltration is focused on getting the data outside of a company’s firewall without being detected. The straightforward technique is difficult to stop because every company needs to allow domain traffic to pass to the Internet. Moreover, because many companies are not looking for such covert communications channels, attackers are likely successful in exfiltrating sensitive corporate data, Cloudmark’s Cook said.


Reflections of an IT recruiter: Happy times are here again!
"In 2014 we really saw new positions, so companies were finally working with new budgets. Companies in the Tampa Bay area have done a lot on the infrastructure side and the security side of technology, versus the development side. "Have we had some development projects? Absolutely. But if I were to step back and look at the numbers, I can tell you with assurity that the majority of positions that we have filed and worked on, even all the way up to the executive level, have been more security-based and infrastructure-based."


Australia 2015 Tech: A Big Cloud Move Coming
“The old adage that IT must be aligned to business is probably over. IT and business must be integrated — business is taking over IT and IT is becoming part of business — you can’t separate these things. That is going to be a big trend in Australia next year,” Sweeney said. Transformation and disruption of traditional businesses has been gaining pace Down Under during 2014 and will continue to accelerate in 2015. Not only are companies such as Netflix, Uber and AirBnB making life rather uncomfortable for established players in their respective industries, the real threat of a slowdown in Australia’s economic growth could force even relatively new firms to rethink their business plans, according to Mark Troselj, managing director for NetSuite APAC and Japan.


McKinsey Global Identifies Twelve Technologies that Can Add to India’s GDP
“The spread of digital technologies, as well as advances in energy and genomics, can be one of the most dominant drivers of productivity in India, redefine how basic services are delivered, and contribute to higher living standards for millions of Indians by raising education levels and improving healthcare outcomes,” says Noshir Kaka, MD of McKinsey & Company in India. To assess the potential impact of the 12 technologies on the economy of India and the lives of its people, MGI sized more than 40 applications in six sectors of the economy: financial services, education and skills, healthcare, agriculture and food, energy, and infrastructure.



Quote for the day:

“Give them quality. That’s the best kind of advertising.” -- Milton Hershey

December 18, 2014

Death To Fillable PDFs And MS Word Forms
Sorry, Adobe. You had a chance with PDF forms, and you blew it. And the world needs to move on. ... The cloud options are easy and inexpensive. SurveyMonkey will work in some cases. Google Forms is flexible and free. Wufoo has more features, as does FormSite, and both are inexpensive. One caveat: For employees who are more comfortable mulling over a form before filling it out, it's courteous to provide the option of viewing the entirety of the form before data entry. Two wins: First, the collector gets the form data back… as data. (PDFs and Word documents can, but usually don't, come back as tabular data.) Second, employees are less frustrated.


Why HP is Investing a Lot in the OpenStack Project
Composability is the main theme. HP wants to have a pure OpenStack platform that can be augmented with as many different plug-ins as possible. “The enterprise needs that flexibility,” Hilf said. Ability to plug in different kinds of software defined network controllers, hypervisors, or storage systems is very important. “We can’t only have the HP storage solution as the answer. It can’t only be that HP SDN controller is the answer.” For this model to work in the long run, OpenStack, the core platform, has to be solid, which is why HP has been investing so much in the open source project.


Find the Right Expert for Any Problem
The basic idea is that you identify people who might have some knowledge of or interest in a given topic area, and you ask them who else might know even more than they do — or who else might know of others with greater knowledge. Then you contact those people and repeat the process until you’ve gotten to the top of that particular topic area, or pyramid, and found individuals with the highest levels of expertise and passion. Once you’re at a peak of a pyramid, you’re more likely to get a referral to someone in a distant but analogous topic area (when we say “distant,” we’re not referring to geography but to contextual differences between subjects). That’s because the highly curious, knowledgeable, well-connected people at the top of pyramids tend to reach out to people outside their domains.


Is Your Brain Trying To Sabotage Your CIO Career?
Possibly more than any other C-suite executive, the CIO runs the gauntlet between dealing with the task- or detail-focused and building the relationships needed to influence effectively. Although a growing number of CIOs come from business rather than engineering backgrounds, the style needed to lead staff working on IT projects is much more likely to be in your brain’s Task-Positive than Default Mode network. Research has shown that the more time your brain spends operating in one network, the more difficult it is to switch between the two. If you've managed to make it into the C-suite, chances are you're already doing a pretty decent job of moving between one and the other but there are things you can do to make that transition even easier for you.


Human error root cause of November Microsoft Azure outage
The outage stemmed from a change in the configuration of the storage service, one that was made to improve the performance of the service. Typically, Microsoft, like most other cloud providers, will test a proposed change to its cloud services on a handful of servers. This way, if there is a problem with the configuration change, engineers can spot it early before a large number of customers are impacted. If the change works as expected, the company will then roll the change out to larger numbers of servers in successive waves, until the entire system is updated.


Wearables In 2015: 4 Predictions
In a Forrester Research survey of 3,000 global technology and business decision-makers, 68% said that wearables are a priority for their company, with 51% calling it a moderate, high, or critical priority. Consumers haven't been as eager. Yet Forrester analysts say that in the coming year more consumers will turn their lonely eyes (and wrists) to wearables, spurred by the arrival of Apple Watch. Forrester predicts the Apple Watch will pull in 10 million users next year.


Indian IT services firms focus on innovation like never before
"Companies are making heavy investments in training the workforce. For instance, Infosys is training its engineers in design thinking, it is training sales teams to sell non-linear services. Companies are investing in building out infrastructure such as digital labs," said Sundararaman Viswanathan, associate director at consulting firm, Zinnov. Infosys' rival Wipro, also Bangalore-based, has invested in a state-of-the-art Technovation Center, a hub of emerging technology solutions that leverages the intersection of technologies to deliver business innovation.


Fears over the IT security of new banks are overblown
According to a study of more than 6,000 people, 72% said they trust their bank with card details. In contrast, three-quarters of online shoppers don’t trust even large retailers with their card information. The study by Bizrate Insights said while PayPal – trusted by 48.9% of respondents – could form strong competition for banking services, tech giants such as Apple and Google were only trusted to protect personal details by 21.4% and 12.9% of people respectively. In the face of competition from a new breed of finance firms that boast state-of-the-art technology, traditional banks' secure IT systems could be their biggest advantage.


The Three C’s of Self-Service BI
The three C’s of Self-Service BI offer a simplified explanation of what, in essence, is hard work. It’s the type of hard work that brings value in terms of efficiency, better decision-making, and empowered users who are all aligned to your organization’s vision. The next time Self-Service is discussed in your organization, keep in mind the three C’s—Connection, Context and Control—and you’ll achieve the necessary framework for a high-performing business intelligence program and an extremely successful Self-Service BI initiative.


Should Your Company Get Cybersecurity Insurance?
Companies feel the need to take out a cyber-insurance policy because the financial cost of an attack can be devastating. Target's data breach cost the company $146 million and counting. Just the act of notifying customers of a breach affecting their credit card data starts at $500,000, Roberta D. Anderson, a partner at K&L Gates in the law firm's cybersecurity practice, tells the Washington Post. While a cyber insurance policy can provide some peace of mind, one expert stresses that it's no substitute for having an in-house cybersecurity expert and following the best practices and protocols.



Quote for the day:

"Continuous improvement is better than delayed perfection." -- Mark Twain

December 17, 2014

Developers Hold the Keys to Unlocking the Cloud
Since programmers coming out of college have been using cloud computing, they have a natural transition to coding in the cloud when they are hired by an enterprise or start their own company. Advanced software tools available to any developer provide an interface that is consistent and easy to use. Since everyone is working on the same platform, it is easy to get help by speaking to a developer in the next cubicle or with a text message to an associate.  By using advanced software tools on cloud platforms, developers can get access to the latest security technology. They can focus on writing code to do what they want to do and then they can figuratively bolt on the security features at the end.


The Theory of Data Trust Relativity
The first take-away is that data governance is having an affect on data use by establishing data quality reports to guide data trust. However, there is a noticeable divide for big data analytics and the data scientist who rely on tribal input and not evidence. If we take data quality's impact on the results and risk of using dirty data for decision making off the table for a minute (stay with me now!) how does this affect data trust? Our survey brought in a small number of executive level business professionals. The number is too low to be quantitative, but it does give directional insight.


Top five books for IT professionals in 2014
Information security, IT governance and IT service management are the dominating topics for our audience in 2014. Brought to the market by our publishing imprint, IT Governance Publishing, the following five books were the best sellers in 2014 across all of the regions we currently serve. We are happy to share this success with you, our blog followers. If you are looking for a useful (and pleasant) read during the festive period, why not take advantage of the following?


Sony’s smart glass uses regular glasses, aims for sports and work
The unit clips round the back of the user’s head, attaching to each of the glasses’ temples. Sony is working on a software development kit (SDK) so people can make hands-free information apps for the thing – the Japanese firm reckons it will be ideal for sports and factory work, and could even be paired with a high-quality action camera to make it easier to check the angle of view. Although the pictures of the device that Sony released on Wednesday suggest otherwise, the module doesn’t have its own camera. Indeed, a Sony spokesman told me that the images are of a prototype and do not represent the finished product.


Cloud Adoption Driven by Reliability, Business Continuity
Patterson noted cloud adoption is moving from the early adopters and development oriented organizations to the more traditional, legacy workloads. "We look forward to more applications being written for the cloud, but the economics and overall convenience of cloud will bring in more and more line of business applications as well," he said. "Our survey shows that security is still one of the biggest concerns when looking at cloud or colocation, but the last few years have proved that cloud is just as secure as a private data center, and in many cases, more so." The study found security continues to be a key priority when enterprise organizations look at migrating IT workloads to either an IaaS model (61 percent) or when considering colocation services (58 percent).


KPMG: Data Security Still Top Cloud Concern
"While the challenge posed by cloud related data loss and privacy threats are less pronounced in the minds of global industry leaders, they are still taking the issue seriously," said Rick Wright, principal and global cloud enable leader at KPMG, in a prepared statement. "The clear trend in the data that we have collected shows that, even in the face of significant media attention paid to recent data breaches, global leaders are still willing to embrace the transformative potential of the cloud." Security may be a concern, but there are other factors that are driving adoption of cloud computing technologies.


Cloud computing helps make sense of cloud forests
The researchers want to unravel the impact of micro-climate variation in the cloud forest ecosystem. Essentially, they want to understand how the forest works—how carbon dioxide, water, nitrogen, and other nutrients cycle through plants, animals, and microorganisms in this complex ecosystem. To do so, they've placed some 700 sensors in 15 forest plots, locating the devices at levels throughout the forest, from beneath the soil to the top of the canopy. The integration of such a vast number of sensor data streams poses difficult challenges. Before the researchers can analyze the data, they have to determine the reliability of the devices, so that they can eliminate data from malfunctioning ones.


Workflows of Refactoring
Martin Fowler keynotes on the need for refactoring and different ways to approach it. You can view here part 2 of this presentation. Martin Fowler is an author, speaker, consultant and general loud-mouth on software development. He's the Chief Scientist at ThoughtWorks - an international application development company, and has written several books on software development and also writes articles regularly.


Finding Maturity in Your Metadata Strategy
The elusive concept here is the connection between all of these new and often repetitive ways of revisiting our information. Organizations continue to struggle with the need to map, the need to interpret and, ultimately, the need to identify. We’ve reached the world of “Metadata 2015.” Because our data will always exist in more than one place it is separated in some way, yet it is similar or absolutely the same in another. Most of us may think we are seeing things differently when we look at these fragmented pieces – whether in the cloud, in stored and downloaded segments, or on our devices. Often this is the case, but sometimes it really is not.


Tools for Project Management and Collaboration
Tools are great! We experiment, test, recommend, and implement tools frequently for clients. But, as you know, implementation and adoption can be two very different things. And even (or perhaps especially) with IT professionals, adoption can be a challenge. Why? IT pros are smart and often feel that the way they do things is the "best" way. They have their tools, and they tend to like them. They are busy and don't want to be bothered adopting a new system or tool. However, at some point, you are the boss. I like to provide leeway in the method, but I do need some standards. To that end, my team and I had several conversations where their input was requested and accepted.



Quote for the day

"The quality of a man's life is in direct proportion to his commitment to excellence, regardless of chosen field of endeavor." -- V. Lombardi

December 16, 2014

Finding critical business data -- fast
"We used to call it ‘complex event processing,’" he adds. But that approach required proprietary software and expensive servers, which limited usage. In contrast, one of today’s technologies, Hadoop, "is linearly scalable, and you can throw lots of hardware at it and use memory very effectively," he says. Roll into that the lower cost of flash memory, adds Baer, and "now we can process data very fast, and do more sophisticated processing than when you were bound by I/O."


The 5 Elements of A Killer Mobile App
By 2015, more than 780 million people will be mobile users only. This means they won’t own a laptop or desk computer. These 780 million users will be your customers, partners, business stakeholders, suppliers, and other business associates. As organizations begin to align their mobile first strategy with this shift in users, it’s important to focus on what these mobile apps must do.


APIs should not be copyrightable
The story of SMB and Samba is a good example of how non-copyrightable APIs spurred competition. When Windows became a dominent desktop operating system, its SMB protocol dominated simple networks. If non-windows computers wanted to communicate effectively with the dominant windows platform, they needed to talk to SMB. Microsoft didn't provide any documentation to help competitors do this, since an inability to communicate with SMB was a barrier to their competitors. However, Andrew Tridgell was able to deduce the specification for SMB and build an implementation for Unix, called Samba. By using Samba non-windows computers could collaborate on a network, thus encouraging the competition from Mac and Linux based systems.


This Linux grinch could put a hole in your security stocking
The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user "root," or full administrative access. With full root access, an attacker would be able to completely control a system, including the ability to install programs, read data and use the machine as a launching point for compromising other systems. To date, Alert Logic has not seen any exploits that harness this vulnerability, nor did the research team find any existing mention of this hole in the vulnerability database maintained by the Community Emergency Response Team (CERT), according to Stephen Coty, Alert Logic's director of threat research.


Frameworks and Leadership on Cyber-Risks
Just identifying and defining the risks is a daunting enough task. Stuart Levi, a partner with law firm Skadden, Arps, Slate, Meagher & Flom who focuses on cyber-security, warns that any company with even a single computer connected to the internet is vulnerable. “Every public company—regardless of their industry, what they do, what data and information they have —needs to be focused on this issue,” he says. ... Aaron Weller, a managing director in data protection and privacy with PwC, said at Compliance Week West that companies need to think beyond compliance to make their data and their systems secure. “Compliance is not security,” he said


How CIOs Can Prepare for Healthcare ‘Data Tsunami’
"Identify who owns the data and build consensus on data definitions," Dunbrack says in an email. "Understanding what the data means is key to making data governance and interoperability work, and is essential for analytics, big data initiatives and quality reporting initiatives, among other things." To be sure, ironing out data governance policies within a healthcare organization is anything but a black-and-white process. Complicating matters significantly are the diverse and growing sources of medical data, each raising distinctive ownership and compliance questions.


Defining a Major IT Transformation Now Happening in Telecoms
"One of the things I'm looking at as operators go through this journey is that this is a cycle that will take between 10 and 15 years," Kelly told eWEEK during a break at the conference. "Most operators have a high capital expenditure structure--they have a lot of high sum costs in the infrastructure--and they're not going to abandon that. What they are trying to do is take advantage of opportunities in the digital services economy to compete against the over-the-top providers, mostly because their core businesses are under attack."


2015 will be the year Linux takes over the enterprise
This rise of Linux in the world of big data will have serious trickle down over the rest of the business world. We already know how fond enterprise businesses are of Linux and big data. What we don't know is how this relationship will alter the course of Linux with regards to the rest of the business world. My prediction is that the success of Linux with big data will skyrocket the popularity of Linux throughout the business landscape. More contracts for SuSE and Red Hat will equate to more deployments of Linux servers that handle more tasks within the business world. This will especially apply to the cloud, where OpenStack should easily become an overwhelming leader.


The First Agile and Lean Open Source Method for Continuous Improvement
There are no silver bullets, we only move forward by learning, experimenting and sharing our discoveries with each other. That is the spirit of Open Kanban to keep those communications lines open, to help people innovate, and collaborate across the aisles of Lean and Agile, a method where innovation and people who think different are welcome. As wonderful as it is to have a few people who think different and collaborate from different sides of Agile and Lean today, this is not enough, especially when they get attacked simply becauase they are seen as the rebels, the non-conformants, the ones who dare to challenge the establishment in their respective camps of Agile or Lean.


QA & Testing Budgets Are Rising for Financial Services Firms
The survey found that as many as 52 percent of organizations are investing more in transformational projects rather than maintaining legacy systems (48 percent). This includes developing new mobile, cloud, and big-data applications and systems. With more development, comes more risk. One application failure can quickly turn into a business process disaster, consumer backlash, and reputational damage -- reiterating the importance of QA and testing today.



Quote for the day:

"My definition of agile is that you accept input from reality, and you respond to it." -- Kent Beck